Action not permitted
Modal body text goes here.
cve-2007-6694
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:18:20.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27555", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27555" }, { "name": "RHSA-2008:0154", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0154.html" }, { "name": "USN-618-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "name": "DSA-1565", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1565" }, { "name": "DSA-1504", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1504" }, { "name": "28696", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28696" }, { "name": "29236", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29236" }, { "name": "30515", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30515" }, { "name": "USN-614-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/614-1/" }, { "name": "DSA-1503", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "28748", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28748" }, { "name": "oval:org.mitre.oval:def:11215", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215" }, { "name": "29058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29058" }, { "name": "ADV-2008-0380", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0380" }, { "name": "30769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30769" }, { "name": "30018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30018" }, { "name": "RHSA-2008:0055", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html" }, { "name": "[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27555", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27555" }, { "name": "RHSA-2008:0154", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0154.html" }, { "name": "USN-618-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "name": "DSA-1565", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1565" }, { "name": "DSA-1504", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1504" }, { "name": "28696", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28696" }, { "name": "29236", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29236" }, { "name": "30515", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30515" }, { "name": "USN-614-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/614-1/" }, { "name": "DSA-1503", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "28748", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28748" }, { "name": "oval:org.mitre.oval:def:11215", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215" }, { "name": "29058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29058" }, { "name": "ADV-2008-0380", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0380" }, { "name": "30769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30769" }, { "name": "30018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30018" }, { "name": "RHSA-2008:0055", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html" }, { "name": "[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6694", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27555", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27555" }, { "name": "RHSA-2008:0154", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0154.html" }, { "name": "USN-618-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=396751", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "name": "DSA-1565", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1565" }, { "name": "DSA-1504", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1504" }, { "name": "28696", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28696" }, { "name": "29236", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29236" }, { "name": "30515", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30515" }, { "name": "USN-614-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/614-1/" }, { "name": "DSA-1503", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "28748", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28748" }, { "name": "oval:org.mitre.oval:def:11215", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215" }, { "name": "29058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29058" }, { "name": "ADV-2008-0380", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0380" }, { "name": "30769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30769" }, { "name": "30018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30018" }, { "name": "RHSA-2008:0055", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html" }, { "name": "[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6694", "datePublished": "2008-01-29T19:00:00", "dateReserved": "2008-01-29T00:00:00", "dateUpdated": "2024-08-07T16:18:20.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-6694\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-01-29T20:00:00.000\",\"lastModified\":\"2018-10-03T21:52:43.213\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n chrp_show_cpuinfo (chrp/setup.c) en Linux kernel 2.4.21 hasta 2.6.18-53, cuando funciona sobre PowerPC, podr\u00eda permitir a usuarios locales provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de vectores desconocidos que hacen que la funci\u00f3n of_get_property falle, lo cual dispara un puntero de referencia NULL.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"},{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F962BE-2187-4C8F-BAE7-EFA3D79FCB8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9_pre5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B58DDD-D3C4-4A2E-A908-64485497207D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD8E4AE-FEF7-4CE2-B338-4F766921593F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8B50A-73F6-4FCF-A81F-FB624FBA7143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1D21AD5-C34F-4005-92F3-98F714DE98D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D27D843-2DA7-4481-857C-09FDC4FBD45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB93128-2743-4668-8C48-9B7282D4A672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA592BC-5846-4FC1-B2A7-13E622705DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FE15BF-91C7-452A-BE1B-7EC9632421C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C1923C-D9C4-400D-9F0F-20B519EEC9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51913F9-FC7D-450A-9A82-5084AA74A5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62E02D5-9EEE-439B-A510-BEEE28A9F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02278C07-E649-427D-9E5C-F1738A01BCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361D407D-A4BE-491D-BC8E-32E78DC4A8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F83D55B-3106-4907-A75F-A7EBF0EC6974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AFD594E-48BA-4281-8DEE-306E3008ABB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CD7983-4EB2-4D17-9332-493ECBADC284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB7E049-4B49-4FB5-815B-39CEAEDE6ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"637A08D0-E382-4DE8-AEEC-6A53A72849B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550DFE6E-DCE6-4649-8746-522996021DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3D2AA2-05B2-46E3-96EE-27EB29795E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E17BB496-749A-40C8-BAA9-6CFBBE308065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF51F68C-60A5-451F-9150-6DABBAE1D41E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3BF9D6-BE14-4590-91B8-501DC92261BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C30F255-1297-46EA-9FBC-05564792FF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6E8B0E-DEDD-43D1-9841-4BAF5A805967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934CBC22-864C-468F-B267-3CDE4449DA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC432E3-7214-4B61-A666-2DAF5CCAEC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7682650A-8332-484D-874F-2B67246880B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFF499A-6602-4BD3-90B5-E6C4AC888812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C406D55-D6CF-443B-B5DB-FC69FBEA01D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484837D-600E-4378-8663-F7BA37E92EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C53EDB2-923D-4860-8251-9A07C9F8FDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E2A5D6B-7011-40AE-8A94-02B062B19010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E460A86-FD22-4023-A0D7-0D2F43131635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFCA2ED-2384-4DB7-9634-AEAEDFF57817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F04081-D672-488E-A91D-5088DD04AA5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BDB59EF-74EF-462E-BC84-89201F734380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0755A136-3DE3-4B61-B5EF-F6282AACD38E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1531AD3-2525-4F6E-B77D-FE8863CBD3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D950C3-0DDC-4549-99F8-1E206768219A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7E2A5B-6CF3-4748-BE4F-F63A4E59CB64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195A133A-26C9-401E-913F-285BA220D1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D68E21-6C58-46A7-96F2-9A79DD880803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E975B63-3D9C-4FA9-A6D0-C9865FDA7AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38D11B12-AFD7-4055-A366-D932CA1BA8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC990132-9DF2-4D23-B9DA-0819809A3CAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFA51D40-E72C-40A4-B238-70F6806FA1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1B7D68-E41E-4A5A-9606-F14F057B39E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7799A9CE-1948-4D71-BADB-A4A7ECAFF5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70BCB10C-FD72-4F18-84C9-AE0603402426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54A74CAB-2BD1-48BC-BCEB-983E72B3C56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF742FF1-5504-41BB-8FAA-D71B83C791B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"901C6D04-3226-4654-9A41-0325B48A2F7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"072A77AD-BB27-4C24-91A0-A12D6E741593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF900D1D-E351-4407-8269-80E5403432B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44915F9F-88DF-4304-8F66-58A869654BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC2D90D-2115-406C-B609-870B241F00B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF681CC1-B3EC-467A-A10D-10840D3D4575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8660C030-328E-4221-847E-AC4BDA08CE79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE83E4E-DBA6-47EB-80FF-9A41A2978DDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58DE3A3-2BE0-45E3-8EFD-5A4439EAD6DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47AEC277-F9A4-412F-B2EA-C1AEA336A46C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7234AF29-BCDA-4728-A141-C169EE59CEC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D9064F-466F-4D66-AD5E-8BC2D31CD80D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"374851C5-C61D-4964-8B4A-473B0A008F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD55C81-3687-46BF-880E-58D7E005A185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2953267F-16BF-404F-83F1-73E0908979B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D953B61-3457-4A0E-A668-BA4937B79784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F5F3607-C0DD-494C-AB6E-46E383A6B17D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19138F52-25EA-42B6-89DC-692A8AF0A720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2EBADC-0817-4E38-9F49-8446D8A20CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"340368E7-0005-4F8A-8AF1-C20A1198288C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC860DD-57DF-4474-AE2B-9AADB9060175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1D576A-0763-4611-B3CF-CD8514F18783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A61F3C5-EA3A-4AA2-8F4E-02E07864801F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F570226-CA89-46F4-8C68-9A59BC0602A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"162A88DA-E2EA-4E92-B174-9AD86BE8D983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE19B6B-9537-4C76-80B2-98DAF2C15B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE5C4F5-C64D-4714-B02E-689B435E3E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4F20D3-77E7-4FC2-AF18-6A5E3AE08615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164F4483-9F28-491A-8F99-4242C9B9CBD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34803A7D-45C4-4DBE-BF18-19CE9DE62A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1178D6EE-A462-4CC1-B430-9A44C75D2336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4360530E-6E07-48F9-B8F8-B36622331052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17508D09-AE14-4458-93A2-E2764452EA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F2CD4A-CCA9-4743-86C4-7675D2487E16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75C1504C-03C5-49E4-8192-E1E698CF07A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB7CB4B0-1CF5-4AA7-A977-9C24AD6C486D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A3172A-E663-42F6-90E7-51C3850AF9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F6692C-494F-44ED-97C6-A6CD05334DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B61C93E-84FE-46CE-A7DD-ACFEFB96BB62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E79FB38-5AE5-4ACD-B4F5-F533C0E1D503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77231F8B-137F-4FAE-BCD9-658F32943CBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552ED77A-F09A-4923-A907-8E0DF8445363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD8EDD0-7817-4A5E-AE97-DA1941E859BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF940EA-676A-42C8-A6E0-7F53C8A34340\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDC8FDE8-DB5A-4B2D-810D-73E91194E00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF7304E-AAA9-4BC3-AEF0-C9509E95ECA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DCCFB1-054F-4BF0-92F1-78A2063415D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D3222C-7469-42F6-984D-3223BCD8080E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697B7069-D08D-41BD-8285-A1ABA0E1142F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72173CFB-BAB6-456C-B5F2-3AA31D799E74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD08A67-195F-431B-98A5-42B2966055DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658C7317-D50B-475A-9E0E-E68AECD49B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1270F454-8E05-413C-BAF4-35D062CA5803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"81941077-0011-4272-A8C7-21D0AFE7DECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2422569B-02ED-4028-83D8-D778657596B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66E4653-1A55-4827-888B-E0776E32ED28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DD4647-564E-4067-A945-F52232C0A33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E20AD05-586B-4493-9793-3FF8028CF887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"169446DE-67F8-4738-91FE-ED8058118F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB349B2-3F78-4197-882B-90ADB3BF645A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7BBB5F-44F7-467F-B934-33ABF744A107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0478831E-87B2-441F-AEC2-403A35FED1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"31523E67-5E4F-43F7-9410-20CB3F287DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B627DE3-2702-4EB2-9733-253D315FB594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B879D6-4631-49A8-9366-75577DFB755D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B76C21-70C8-4911-A24B-270F876EF7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"390B1E09-7014-4A74-834C-806BBEBAF6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF02479-2124-4655-A38D-A4793D3B8A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89DC9CD-C06F-4B9B-B376-900E65016296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"707ECC75-65B6-4B02-BE85-A4804549A2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"54393D69-B368-4296-9798-D81570495C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6791A801-9E06-47DD-912F-D8594E2F6B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55F2549-F813-4BD6-8933-6788D898ECB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:apple:powerpc:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DA3EF4E-F381-4065-B51A-34428967C763\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0055.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28696\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28748\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29058\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29236\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30018\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30515\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30769\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1503\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1504\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1565\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0154.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/27555\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-618-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0380\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=396751\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/614-1/\",\"source\":\"cve@mitre.org\"}]}}" } }
ghsa-j22x-whv2-v2w4
Vulnerability from github
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.
{ "affected": [], "aliases": [ "CVE-2007-6694" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-01-29T20:00:00Z", "severity": "HIGH" }, "details": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.", "id": "GHSA-j22x-whv2-v2w4", "modified": "2022-05-01T18:45:30Z", "published": "2022-05-01T18:45:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215" }, { "type": "WEB", "url": "https://usn.ubuntu.com/614-1" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/28696" }, { "type": "WEB", "url": "http://secunia.com/advisories/28748" }, { "type": "WEB", "url": "http://secunia.com/advisories/29058" }, { "type": "WEB", "url": "http://secunia.com/advisories/29236" }, { "type": "WEB", "url": "http://secunia.com/advisories/30018" }, { "type": "WEB", "url": "http://secunia.com/advisories/30515" }, { "type": "WEB", "url": "http://secunia.com/advisories/30769" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1503" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1504" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1565" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0154.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27555" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0380" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2007-6694
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2007-6694", "description": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.", "id": "GSD-2007-6694", "references": [ "https://www.suse.com/security/cve/CVE-2007-6694.html", "https://www.debian.org/security/2008/dsa-1565", "https://www.debian.org/security/2008/dsa-1504", "https://www.debian.org/security/2008/dsa-1503", "https://access.redhat.com/errata/RHSA-2008:0154", "https://access.redhat.com/errata/RHSA-2008:0055", "https://linux.oracle.com/cve/CVE-2007-6694.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-6694" ], "details": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.", "id": "GSD-2007-6694", "modified": "2023-12-13T01:21:38.367394Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6694", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27555", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27555" }, { "name": "RHSA-2008:0154", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0154.html" }, { "name": "USN-618-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=396751", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "name": "DSA-1565", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1565" }, { "name": "DSA-1504", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1504" }, { "name": "28696", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28696" }, { "name": "29236", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29236" }, { "name": "30515", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30515" }, { "name": "USN-614-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/614-1/" }, { "name": "DSA-1503", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "28748", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28748" }, { "name": "oval:org.mitre.oval:def:11215", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215" }, { "name": "29058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29058" }, { "name": "ADV-2008-0380", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0380" }, { "name": "30769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30769" }, { "name": "30018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30018" }, { "name": "RHSA-2008:0055", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html" }, { "name": "[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9_pre5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:apple:powerpc:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6694" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=396751", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "name": "RHSA-2008:0055", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html" }, { "name": "27555", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/27555" }, { "name": "28696", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28696" }, { "name": "28748", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28748" }, { "name": "DSA-1503", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1503" }, { "name": "DSA-1504", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1504" }, { "name": "29058", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29058" }, { "name": "RHSA-2008:0154", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0154.html" }, { "name": "29236", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29236" }, { "name": "30515", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30515" }, { "name": "30769", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30769" }, { "name": "USN-618-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "DSA-1565", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1565" }, { "name": "30018", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30018" }, { "name": "ADV-2008-0380", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0380" }, { "name": "oval:org.mitre.oval:def:11215", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11215" }, { "name": "USN-614-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/614-1/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-03T21:52Z", "publishedDate": "2008-01-29T20:00Z" } } }
var-200801-0578
Vulnerability from variot
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference. The Linux kernel is prone to a local denial-of-service vulnerability. Attackers can exploit this issue to crash the affected kernel, denying service to legitimate users. This issue affects Linux kernel 2.4.21 through 2.6.18-53 running on the PowerPC architecture. The NFSv4 implementation is one of the distributed file system protocols. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1565-1 security@debian.org http://www.debian.org/security/ dann frazier May 1, 2008 http://www.debian.org/security/faq
Package : linux-2.6 Vulnerability : several vulnerabilities Problem type : local Debian-specific: no CVE Id(s) : CVE-2007-6694 CVE-2008-0007 CVE-2008-1294 CVE-2008-1375
Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-6694
Cyrill Gorcunov reported a NULL pointer dereference in code specific
to the CHRP PowerPC platforms.
CVE-2008-1294
David Peer discovered that users could escape administrator imposed cpu
time limitations (RLIMIT_CPU) by setting a limit of 0.
CVE-2008-1375
Alexander Viro discovered a race condition in the directory notification
subsystem that allows local users to cause a Denial of Service (oops)
and possibly result in an escalation of priveleges.
For the stable distribution (etch), this problem has been fixed in version 2.6.18.dfsg.1-18etch3.
The unstable (sid) and testing distributions will be fixed soon.
We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
The following matrix lists additional source packages that were rebuilt for compatability with or to take advantage of this update:
Debian 4.0 (etch)
fai-kernels 1.17+etch.18etch3
user-mode-linux 2.6.18-1um-2etch.18etch3
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.dsc Size/MD5 checksum: 740 950fed7ed7c289cfea9c1b39f0f41bc0 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.dsc Size/MD5 checksum: 740 6f6faa132a53e808bcc61823d140290a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.diff.gz Size/MD5 checksum: 5395308 ae08d42b58cd3cf93a23fe31615ac2fd http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060 http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.dsc Size/MD5 checksum: 892 ca5cdee7568704bc9f6c58f786d0daae http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.tar.gz Size/MD5 checksum: 55267 981e9a0a1d79b1605164588eef7da492 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.dsc Size/MD5 checksum: 5672 4e4714f542968b30b2c3f94e203e1e04 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.tar.gz Size/MD5 checksum: 55185 0a46d75b3ced870a96ea41b900f1ecaa http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.diff.gz Size/MD5 checksum: 16873 868c1f27ad2c8db782bbd2bdc3618d70 http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.dsc Size/MD5 checksum: 892 52c602d55bdc301a0622ed8a63745f29 http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.diff.gz Size/MD5 checksum: 16968 ff99991657e11545a0f557b623962c52
Architecture independent packages:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch3_all.deb Size/MD5 checksum: 3589210 d2033347599e8db12e2446fd75c0ce37 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch3_all.deb Size/MD5 checksum: 54558 3362cfa5f1de0c80b1aa96f22d846c7e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch3_all.deb Size/MD5 checksum: 1586214 a496f633c826ce730ce6150dff49209f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch3_all.deb Size/MD5 checksum: 41463452 67e56915cd61f4b0058aa668e284ca8c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch3_all.deb Size/MD5 checksum: 1085670 9c6513bc6e29a63d0aedc8da8958fc3f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch3_all.deb Size/MD5 checksum: 3752262 e2f225858212089b10aa319236d300f3
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 3027694 ef8b352212a8184702407e69cb7046bd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 268330 7b7d0ab15fe537a59c68b35531750739 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 54038 f42aafb19b9fae6445d0581277b60e92 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 23531650 8633558cda9f10fbadbc9299dde77575 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 54074 f4b61f5f330a7a2248d91432fa307f41 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 268076 09bdbafb6d32a4d9f8ceab5f1a6c666e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 23484202 d14e2e1d8537aa0cb2f2367f6ddd6762 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 23844262 0cb427290707d8a59a3afdf68f523e6b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 3052524 4323a32807ee9a2a7f13bc605ef0a9c7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 268772 bcec817953f14a50253dbe83e16d6c70 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 23462618 f6873f376755c4f29b24d0d11c9d70ae http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb Size/MD5 checksum: 267446 376df6aed1989d65f8144f8790862e17
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 15260738 6c000df81a113d2d69a9473a3d764f08 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 16859134 9480377d14efcd65c7bde090d2c18023 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 3357018 fcb1a842f85110b4a37d246621027ad3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 271914 9a7953d1adbcfbbea07a1357450f34a0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 15272470 2581dfa79e27ead359eb27642748b3df http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 54066 ce821a602278441fb157d2e8dffa7840 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 16820486 a1540f416895111ff4a4f6dc8d5ae2ad http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 3191118 dae286014c3a55824e3cb3040948caa4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 271584 5246a3f1ccb78bde203aab0338e90cd3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 54038 20567a8f59997151900492fbbdb5a5bf http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 54012 fcd8a752e777bf97667914fe658ca440 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 3167674 8fed61ce7278a060d600e54481851c2b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 3334306 bd7dd1d9b1518e0e52f3d513ad9f7cea http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 1650934 92ab0f73f6d2a1699f975ebede812c99 http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 54034 224990e92d1255bac74a4a540ef8ee15 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 271184 4d2dfd603bf61408db599c9a972d6824 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 1682946 a2ccb197f0b4bc35e889a61c095add5e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb Size/MD5 checksum: 272850 4cab43a5199e6764b4857a91aaa52e09
arm architecture (ARM)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 7924514 6f93e2c2e0f3e5ddeddb95bd50d560ef http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 233088 acb0dd092348b024f08e0fc2467c31f3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 54104 1437f25c10919b2f944295b8d7f168d8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 54064 1afdbacaa80466a4705a9b7ef50a4a9d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 239810 542097b2625db36fa56dfd7a29b66f37 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 233830 e9a09a7d2a3927486adc68e1f1f7f0f8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 3410416 dfc64565c01ac1f01784d72a8befa378 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 7566074 822c9f74d2a88f4ac8e94210ecb06752 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 204874 1b773fb8b26f20629b8c868db90c5521 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 5009022 ef23e40a692019b29f03f1ef7c864e12 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 4586924 66c55044ecf936cf08b69e3f78f8318e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 8870890 a5a52727b1e019791b260c65d4793911 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb Size/MD5 checksum: 198750 09c8bda5566b05dd0f969dedfc316d4c
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 10552252 247e3774a6493211af6575531966a8a4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 3020374 69fbbe6591cdab73257c9f68bacb63c0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 54044 77f6c66523dba6bb546b28b6b40b51e9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 196344 3ed099784ab8fe2f625462b1689ea7cd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 196818 f0d8bbb055a380b4c2b6064bbd9de0ac http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 54068 f91b5aa270a091f57a246e4cf1f6924a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 195368 29352673ddd4364e7dab3f5a1eb6e2d1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 197570 bde8500410397921905e78f71cd68a10 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 11398348 8201e0a1b33c60d737fb2821dadb8d18 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 10999924 6a0b08925946b094d1638ca20095df15 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb Size/MD5 checksum: 11806360 7e63ef04531d59c2e3d0c93893d09bf0
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16376092 f7e958b27f039bb044d46f94cc0c9231 http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 54014 593ee26c9bed3b3c853511c6bbbd13ea http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2_i386.deb Size/MD5 checksum: 25583354 6cc7cc34a241783bb8f3b2c9da7595a2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 278502 0f7f0e13f78438eeb1a939a637b8070c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16466936 99c66acfa3cd0c109f0d3e2eaedf8877 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 279716 62626201a89882bab17d10ce706b2df5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 14289932 049b2b4696e9cbeec20ec8c2056c7185 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 277596 042152b79d08eea568fd7481b4849386 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16507076 a1a5845401d351c6fa1f380565bcb5d6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16190600 6c50e29e1616140b367e626c93db2ae4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 271900 8d74262b41e039125ce896f8e8d2f8bd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 272690 94db026fc7d498b48c5ac0b504f63390 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 1299670 879785b1ee5f4ef0bec7423e5c7599e9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 14279230 3101d59c0d8ad8bf617f4d0eefbbb7de http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 54088 e23a1d89d0f998caed5b594c5762dc19 http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 54032 d7b04d8d6f7a0d43579a499e4e0b681b http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2_i386.deb Size/MD5 checksum: 5518204 0ce72fa3c9dfd208b1afa6912ffbcc3d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16336828 0780d6d13e90466249f83e6d72ce1780 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3_i386.deb Size/MD5 checksum: 5518218 b86648769c5d3db2eb79b1bf6d490c50 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 3148608 633afcaaeb9d655b8bde34977bfd0bd5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 272236 a611f8a0301e945ce72af3610bc05350 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 3054330 6cfae664f54be8c9ed3958c003f404c9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 3167916 756a4eed5e44d0530c5f20a7bc80d3d2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 279366 357140fdeff990683639e8f290593b0c http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3_i386.deb Size/MD5 checksum: 25583596 f0c6d87c849d5384be99dba70d34fb0d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 282728 a6b21a6fc38381b3884b2d2cd052d306 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16836766 be9c22427d5666a80bf96e4c6501ebf7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 54030 125894b7dd2b90ba5f48de2e7f04518b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 1326708 add492f75bb0337e6e69a4afb73114c6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 16404432 9411c28cfbb27329417aa28b32de764c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 3170704 6b86d80969e7f62ceaae5ee5af7f1a5c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb Size/MD5 checksum: 279198 92c75044e071977263a20c444ee655d0
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 255464 ad4b1e9a12ca70ebb46a4c0f77bb62bf http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 28013676 bacb3a11176542aa961867eaac8539d3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 28181506 d0c75846976e8ebcd8baf1ee64a46414 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 54036 746e70c193f28c412acec61cf63e4572 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 54050 fa3dc6c7671185e9ce4f7a00783990dc http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 3081858 970b72442606e4878d77a274d4fa4306 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb Size/MD5 checksum: 255414 885054343ab6670ce1d90f7bdda61ef2
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 167030 7bce3329b9fc5d10faafecfac21bc70a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 186870 37e9b246abeb84886cd9a6215187f229 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 8309262 893346de1a07ed015320fe333fc41037 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 15653182 1938128d29990cc16bc3f829d3fa1cbf http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 6125514 e6842c7aedc7b70d5a4a5d8e624e9627 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 162870 5ebcff098fd97c89bc0f3057f68c3e31 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 54110 9408231d8eb91431b2ca495f1e94f3cb http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 54054 ed109dbb8bf134256164d6d07bd061f6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 3413590 6013078ea705dbf5367d284f6ae401a4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 154266 e5775b643e07055ec7121815d9316e62 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 186682 9027d5504f2739d64d1bb4111ec5e136 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 15677870 4b5a1f2e56c587a0d470ea17fab07647 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb Size/MD5 checksum: 9075438 02f535440d5018de7b6233b232aa04de
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 9863510 a6c8def78ca64e8e8b6ef10533186d30 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 149960 2e09d53e58663189a043b7d7493cec8e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 5926528 cb0dfe477608a2da181596f9b78ceddc http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 155716 76a619c24cc74cfe22ab42f9f2964096 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 54040 affef50872a733868e2e3d58d566993a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 155772 dd2d75f96ee5dd4c7a7ff8250f631649 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 182490 f6be30e57bbff0ecace79826d4474bb3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 5941862 45689ea22cb4ebdfb71936f79e00eebe http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 178194 4baf9d4d2fed0b5e3f12add06fae014b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 3350066 4938243e89da8ace26c47d00bc60acf1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 182706 84024a93ebcd9d394f179c8ee254ef1b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 15053292 024f0d5e1fbaf5c7d5664aca87ac8741 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 54102 d25d6e1de865a3da93959dd8f8034d7f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 6027404 26b3c01fd8f1c798189c1ee5ec44d11c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb Size/MD5 checksum: 15030096 69c0f1d1c25f49c3201a0b3edc1873b0
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 16402406 7f918a1714d84f8ccb6aaf1a13fc518e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 17016786 c06998d5b9b3c192bde5ecc4119830a1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 54088 3683bf42ff1af3009202bf4c6a0e30cd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 16626352 37c3c60edcd7f7b22ededfcda073b5a8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 251358 20ade66e354f4473ff045bb0e4e2f7c5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 229986 a6996ddd8cd1f5439aecfc4693ab83f9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 54036 d451146b15c05d5d630f72a3399a3464 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 253356 69fd6bca694ce1aea2788658eb530d3e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 18348404 6899ee7990a534276f4c98970a05a843 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 3414514 54cad7ae1cd248f0125aa12c9823f0c7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 18293832 2025add962d50482de362ee202f8bb79 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 252806 ed8f3ba9ab6384096d25204af0594ed1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 3392288 02cba07fa4ab35192737f7a40907cf53 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 16969082 d986973f5c4d0e577b169c96ffa0cec4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 15157518 c3ae440ddcd66b9aaa80260824f91967 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 253230 4d2e3ce370d0c3caf798cfee0dfc44d2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 246254 fa91c1654d4f46128856838066eb11bf http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb Size/MD5 checksum: 252272 5eda39b6177f4e66f082c06a159f5719
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 54058 9e8a26d5500ffcd7a6a29dfac6d570b8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 54032 350d6fe5dcfdefcc6f92e364f0ffba3f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 5401990 4af4cf18cb011bb00bb882f7a03c9a21 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 143264 76db142c20b22a4d0847f6309e0a10da http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 2966014 81cfb914839c4709399e25ffe9eb2cb5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 143688 4291bc7d9865c2842a181b22a7992188 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 5661534 8f7661bfe58017b2e3aa2eb9ca3ffadd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 1438796 18d9f041343153cf48f441eeed112885 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 5619704 7213d869d6e23933ae5e55c87fade8f6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 144632 5df45b01064fc7de2106e8b532946cb5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_s390.deb Size/MD5 checksum: 2942938 7dcac05e6588849c7491ef1004759f39
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 3168126 ef5277a44be4e2fb95d7f7feca1cc568 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 165126 8d82f98016c375c250105791051e3021 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 6411270 7106725061d98e4036d0ebabd01ca7fa http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 195102 73419b6d64a68410924a0471f0d3bf62 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 10391364 f35ec6950afc88b69fa814d005b68550 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 54046 dbd49273f393e72c21f056d50f94cf02 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 3190444 40bc9af5142779024dea09675f833778 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 194260 80fdc90e470899b21ae831aaa06702b9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 195828 2036f355f29c418602074540bde81c65 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 10693152 7bef279c0e967019fa5e8a07c1eb4019 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 10647534 197798f662b6e4fc55d0f64dcea6eeff http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch3_sparc.deb Size/MD5 checksum: 54076 8a2d9ac2067a4c8a7b090da06faf4025
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFIGgmwhuANDBmkLRkRAoRpAKCCo/Ja0CkmHW8VQijCHN7Y5l113ACeKR48 1gWjfQ6MRn5jOphirPT8DZg= =22DK -----END PGP SIGNATURE----- . =========================================================== Ubuntu Security Notice USN-618-1 June 19, 2008 linux-source-2.6.15/20/22 vulnerabilities CVE-2007-4571, CVE-2007-5904, CVE-2007-6694, CVE-2008-0007, CVE-2008-1294, CVE-2008-1375, CVE-2008-1669 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 7.04 Ubuntu 7.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: linux-image-2.6.15-52-386 2.6.15-52.67 linux-image-2.6.15-52-686 2.6.15-52.67 linux-image-2.6.15-52-amd64-generic 2.6.15-52.67 linux-image-2.6.15-52-amd64-k8 2.6.15-52.67 linux-image-2.6.15-52-amd64-server 2.6.15-52.67 linux-image-2.6.15-52-amd64-xeon 2.6.15-52.67 linux-image-2.6.15-52-hppa32 2.6.15-52.67 linux-image-2.6.15-52-hppa32-smp 2.6.15-52.67 linux-image-2.6.15-52-hppa64 2.6.15-52.67 linux-image-2.6.15-52-hppa64-smp 2.6.15-52.67 linux-image-2.6.15-52-itanium 2.6.15-52.67 linux-image-2.6.15-52-itanium-smp 2.6.15-52.67 linux-image-2.6.15-52-k7 2.6.15-52.67 linux-image-2.6.15-52-mckinley 2.6.15-52.67 linux-image-2.6.15-52-mckinley-smp 2.6.15-52.67 linux-image-2.6.15-52-powerpc 2.6.15-52.67 linux-image-2.6.15-52-powerpc-smp 2.6.15-52.67 linux-image-2.6.15-52-powerpc64-smp 2.6.15-52.67 linux-image-2.6.15-52-server 2.6.15-52.67 linux-image-2.6.15-52-server-bigiron 2.6.15-52.67 linux-image-2.6.15-52-sparc64 2.6.15-52.67 linux-image-2.6.15-52-sparc64-smp 2.6.15-52.67
Ubuntu 7.04: linux-image-2.6.20-17-386 2.6.20-17.36 linux-image-2.6.20-17-generic 2.6.20-17.36 linux-image-2.6.20-17-hppa32 2.6.20-17.36 linux-image-2.6.20-17-hppa64 2.6.20-17.36 linux-image-2.6.20-17-itanium 2.6.20-17.36 linux-image-2.6.20-17-lowlatency 2.6.20-17.36 linux-image-2.6.20-17-mckinley 2.6.20-17.36 linux-image-2.6.20-17-powerpc 2.6.20-17.36 linux-image-2.6.20-17-powerpc-smp 2.6.20-17.36 linux-image-2.6.20-17-powerpc64-smp 2.6.20-17.36 linux-image-2.6.20-17-server 2.6.20-17.36 linux-image-2.6.20-17-server-bigiron 2.6.20-17.36 linux-image-2.6.20-17-sparc64 2.6.20-17.36 linux-image-2.6.20-17-sparc64-smp 2.6.20-17.36
Ubuntu 7.10: linux-image-2.6.22-15-386 2.6.22-15.54 linux-image-2.6.22-15-cell 2.6.22-15.54 linux-image-2.6.22-15-generic 2.6.22-15.54 linux-image-2.6.22-15-hppa32 2.6.22-15.54 linux-image-2.6.22-15-hppa64 2.6.22-15.54 linux-image-2.6.22-15-itanium 2.6.22-15.54 linux-image-2.6.22-15-lpia 2.6.22-15.54 linux-image-2.6.22-15-lpiacompat 2.6.22-15.54 linux-image-2.6.22-15-mckinley 2.6.22-15.54 linux-image-2.6.22-15-powerpc 2.6.22-15.54 linux-image-2.6.22-15-powerpc-smp 2.6.22-15.54 linux-image-2.6.22-15-powerpc64-smp 2.6.22-15.54 linux-image-2.6.22-15-rt 2.6.22-15.54 linux-image-2.6.22-15-server 2.6.22-15.54 linux-image-2.6.22-15-sparc64 2.6.22-15.54 linux-image-2.6.22-15-sparc64-smp 2.6.22-15.54 linux-image-2.6.22-15-ume 2.6.22-15.54 linux-image-2.6.22-15-virtual 2.6.22-15.54 linux-image-2.6.22-15-xen 2.6.22-15.54
After a standard system upgrade you need to reboot your computer to effect the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-386, linux-powerpc, linux-amd64-generic), a standard system upgrade will automatically perform this as well.
Details follow:
It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations. A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy. (CVE-2007-4571)
Multiple buffer overflows were discovered in the handling of CIFS filesystems. A malicious CIFS server could cause a client system crash or possibly execute arbitrary code with kernel privileges. (CVE-2007-5904)
It was discovered that PowerPC kernels did not correctly handle reporting certain system details. By requesting a specific set of information, a local attacker could cause a system crash resulting in a denial of service. (CVE-2007-6694)
It was discovered that some device driver fault handlers did not correctly verify memory ranges. A local attacker could exploit this to access sensitive kernel memory, possibly leading to a loss of privacy. (CVE-2008-0007)
It was discovered that CPU resource limits could be bypassed. A malicious local user could exploit this to avoid administratively imposed resource limits. (CVE-2008-1294)
A race condition was discovered between dnotify fcntl() and close() in the kernel. If a local attacker performed malicious dnotify requests, they could cause memory consumption leading to a denial of service, or possibly send arbitrary signals to any process. (CVE-2008-1375)
On SMP systems, a race condition existed in fcntl(). Local attackers could perform malicious locks, causing system crashes and leading to a denial of service. (CVE-2008-1669)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15_2.6.15-52.10.dsc
Size/MD5: 2611 f3dd319890b9704ecc00045636534db7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15_2.6.15-52.10.tar.gz
Size/MD5: 446767 c94e2a00ecf18fce9dd031ac6e9cd052
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67.diff.gz
Size/MD5: 2873504 d7723bb11612357b4608e8f60e4b8418
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67.dsc
Size/MD5: 2374 45557a3d6035adbdd6ed5305b0833105
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-52.3.diff.gz
Size/MD5: 95993 a73703b2df5faf419f59a512078613a2
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-52.3.dsc
Size/MD5: 3194 c10a6c6c95b0be5c93d4681f2a5759b8
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12.orig.tar.gz
Size/MD5: 97745908 fb5765cfa2b0fdb06deb54fd6e537772
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-52.67_all.deb
Size/MD5: 5162896 72f6b6c423959afebb74c6a804c0f388
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-52.67_all.deb
Size/MD5: 92962 51e59e2666145a31fb4ac47c3d4ab61e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67_all.deb
Size/MD5: 44740314 06fa6b3c9496839b240aa285a9f85e26
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.12-52.3_all.deb
Size/MD5: 18452 37a5059b2b5efaa59c7e688a6003c732
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-generic_2.6.15-52.10_amd64.deb
Size/MD5: 165150 0a73a8b05abfc08043f9e308459a3a9e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-k8_2.6.15-52.10_amd64.deb
Size/MD5: 165240 50c208a7c25cdf1b13c4edc5703e23b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-server_2.6.15-52.10_amd64.deb
Size/MD5: 165290 61dc26e3f218600402384d3dd495d6b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-xeon_2.6.15-52.10_amd64.deb
Size/MD5: 156050 7a9506a56279a9e2f053c931a91cf5d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-amd64-generic-di_2.6.15-52.10_amd64.udeb
Size/MD5: 84706 763f0c324d411c838e179af730f45d67
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-amd64-generic-di_2.6.15-52.10_amd64.udeb
Size/MD5: 97394 0117222de0bf93e1a89af25d628d6c16
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 22342 72e3223d194781df52d35571f6325760
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 44764 43dcd9724184cf62e5f9cab54afe1e13
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 2304 4e9ebca859508d6c5464ff9f06e57ade
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 36244 5aaf7d1dbe903fbeeddf3ecfc8901128
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 102284 5065464eff55e17f28a35f5e57a842bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 38874 e26b198e7cc4a18f5797df9f44dd91dd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 49134 4a80334564469d8118821235792f9bef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 176690 9aacdae559d3bc97a2640ce4d58da0f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 36768 8cffcbc067254877445e6105396a5f16
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 142248 4c44b18a12bf86917275670a71cd3720
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 51040 79823112f8894465b411b91357582252
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 140606 d94e572bb96c18f35c3b536042d34a24
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 286872 653ea1a2020706629e7a4ec2abe489d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 97788 6c0387e7d1b0f25d0335a4471931e0be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 1650922 76ec5ee75959713b6a6b1cb18c14d646
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-generic_2.6.15-52.67_amd64.deb
Size/MD5: 865032 d6c05bd69946a41ff5973f94ff122aa8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-k8_2.6.15-52.67_amd64.deb
Size/MD5: 869106 ac69148ec23b3387116044527ae22eaf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-server_2.6.15-52.67_amd64.deb
Size/MD5: 870098 07f513158e47bc6a167d5e535dc0162a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-xeon_2.6.15-52.67_amd64.deb
Size/MD5: 869108 ff2a239414471590ab6be64c50de8bf2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_amd64.deb
Size/MD5: 6921780 5fd6888d0cee59933c68eb44aa2c7a73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-generic_2.6.15-52.67_amd64.deb
Size/MD5: 20809038 6d59f0d3dfa5f99df35be979b1405a89
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-k8_2.6.15-52.67_amd64.deb
Size/MD5: 20780064 160dc131a43e31bc0ac8901ca74985b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-server_2.6.15-52.67_amd64.deb
Size/MD5: 21629596 4069011a19bc0bbf68365146ae33c0aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-xeon_2.6.15-52.67_amd64.deb
Size/MD5: 19896776 39907bab9abcf29f0bf969d3d402ed0c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 15622 6978c2690730ec2f561763ef5122bcb1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 240352 2ddb4ac8cf58569791230da89a30a9b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 202552 147e6b2684c8db670776a7e168ba0512
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 1048600 5da9db1b27e8954ee79eb80c41eec163
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 1543100 7ae3da3261b08b812d68021e9797f8af
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 161644 8a3bcf8f7850a714858ed668ef5b3976
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 9828 860022b69a682ef0bfa92249055e6e8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 80852 1b447c6d6339da87350b44bf223c7d93
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 49164 2d90f509d7d5ade4b623bc82ac3bea22
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 35158 077981a17ebfe2bbefa3660f208f43b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 70856 4c4c628331820d9ded9e2f8e00ff0ec2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 6216 2652727a590c6e7248d3be4b2e0f838c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 9058 92df3c6ba60457acd1f602696df3aac6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 57874 71fc227183b138479093e72d2dd964c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 123330 19a834fb4cff1ac35b96eb6eec3fa5a6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 101000 e595f2e9f9997f83b7658f0bd7138272
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 79230 59fb1d8c41d9ecaa1c483981dff8c31c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 1594716 2df0dbbe97e5c709125495de80a31c3c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 72278 aeda6dfe658cec5ad60f9580f1c02141
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 12646 612cd82d3c221c2494a95b10a75f03b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 33730 5991265208e2a44916d540822bd1ac9c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 138546 ef8d40670f8aa326b3de679d3843e42e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 38926 5cdd7a00236247e10834b2ca00aa938d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb
Size/MD5: 278736 3d615d96e1648ed1f8a72b9b770fa847
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-52.3_amd64.deb
Size/MD5: 2405512 0b06044aefe8becb1d0467f5bfdc247d
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-52.3_amd64.deb
Size/MD5: 511050 e10b89624f7e210d063a0197902e19eb
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-52.3_amd64.deb
Size/MD5: 1754564 c5c2d9b0533602e9c3e3de858184a655
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-52.3_amd64.deb
Size/MD5: 1406452 0ea039bbeca0570589afa2e51744c3c1
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-52_3.11+2.6.15.12-52.3_amd64.deb
Size/MD5: 475572 4432740400b495606aa776d96ba4ba18
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-52.3_amd64.deb
Size/MD5: 76748 cc23398150beebe4a1d561bf9ff81706
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-generic_2.6.15.12-52.3_amd64.deb
Size/MD5: 6861864 0654701d92f5de082562a776d201c110
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-k8_2.6.15.12-52.3_amd64.deb
Size/MD5: 6861248 3ea71d011938ba44253b417acb105e80
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-xeon_2.6.15.12-52.3_amd64.deb
Size/MD5: 6837846 6642dc1eff1db10dedd772a63641124a
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-amd64-generic-di_2.6.15.12-52.3_amd64.udeb
Size/MD5: 798882 0dfab4528cb8a35acaefe9927000f685
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-amd64-generic-di_2.6.15.12-52.3_amd64.udeb
Size/MD5: 497228 5922e6e6038e6144f2e9643bf8de2287
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-52.3_amd64.deb
Size/MD5: 167244 eb84a383434ff2a22cc68fb0ca060215
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-52.3_amd64.deb
Size/MD5: 162302 fa7b1343f60ffbc8298da3bb0f7ac206
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-52.3_amd64.deb
Size/MD5: 6071704 db1d1a77b262ccd2e7d4bf4212919e1b
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-52.3_amd64.deb
Size/MD5: 7328604 305ee65ddbd1e715d5c8fc0d2e411db7
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-52.3_amd64.deb
Size/MD5: 125880 fe13a90e72b74c93432a97c4c2ecf88f
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-52.3_amd64.deb
Size/MD5: 17297042 88992a1f7adea96330b4b1909a5a0605
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-386_2.6.15-52.10_i386.deb
Size/MD5: 169386 de66f59240599c189971ff2617a32471
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-686_2.6.15-52.10_i386.deb
Size/MD5: 177254 c645c75cefa72df027ecf9992a0321d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-k7_2.6.15-52.10_i386.deb
Size/MD5: 175374 a78aeb6390f3b9056e0ba884aa7dea73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-server-bigiron_2.6.15-52.10_i386.deb
Size/MD5: 178040 ab1e27ab921d3c062af1d83a2711fd26
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-server_2.6.15-52.10_i386.deb
Size/MD5: 178004 36432e0be482eff2ad7d7b11e3393685
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-386-di_2.6.15-52.10_i386.udeb
Size/MD5: 90234 532960ad957a474af1d36f22c6f09d45
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-386-di_2.6.15-52.10_i386.udeb
Size/MD5: 90404 47bdb4c98e5bec0e9987190d0abc4ff6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 18968 d4428c28842acd44ebbc900062265429
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 43448 09b66d5cc8ce769329e5cb1f5c5ff88a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 105204 7a968c3b6170d141b0cd6ae69d9ccb57
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 2280 724ecd00ebbddee0cedc950d13e39c7e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 34572 257f312f78de2f814a6909fb11a51be3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 96958 b7e56256c4e585f3d2b6ad110370aebc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 37092 be752e4622e517275a340cff56052a0f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 44060 f2dc9462c8b4fb93e16f0cbbc39b5efb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 167734 762f6dd3391cb3477c7eae7c5cf0ba8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 33928 6685b0652c78ded543a1cf9e49da7c50
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 137840 7698662c1142eb2c2f94b79145ec08ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 46872 f91472c2465256ba325975329f7ab850
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 132966 0fe968b8f8abfcb323e2834e60c100f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 273450 f16f2f5c2cf9b35f5411785d1c57fc31
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 102252 10b945d089d0b473f999afedd1b922aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 1595606 0a4698dbff475bb5b82e70606f207a37
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-386_2.6.15-52.67_i386.deb
Size/MD5: 859020 2b9ebda6ae3855a7732bd3d3641bd568
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-686_2.6.15-52.67_i386.deb
Size/MD5: 858486 2e8859c47eb2536c12b47f57d1ebae95
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-k7_2.6.15-52.67_i386.deb
Size/MD5: 859998 bd6e70b3830d5219e66a5414a1665dc7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-server-bigiron_2.6.15-52.67_i386.deb
Size/MD5: 864228 d74d9ae20edecf320bb41b2e48c48e79
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-server_2.6.15-52.67_i386.deb
Size/MD5: 858828 b27f151fa2fbf48ed5b3f5f9899f3adc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_i386.deb
Size/MD5: 6913986 281a26735bed07a88bcb08df8cbd717e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-386_2.6.15-52.67_i386.deb
Size/MD5: 21709730 fae2c52a1f4def5d9335feafd8d598cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-686_2.6.15-52.67_i386.deb
Size/MD5: 22506028 869a8657c02443b272666d8fb1a20a1c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-k7_2.6.15-52.67_i386.deb
Size/MD5: 22248206 b7c51bd51c0e66825a5bb4b098588756
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-server-bigiron_2.6.15-52.67_i386.deb
Size/MD5: 23606178 bd2a7c7353793db1baf04eb545a1241d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-server_2.6.15-52.67_i386.deb
Size/MD5: 23170614 47e400c98cb6f4f1073a7f36842a5753
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 15502 f5a50985b9f50e270313efd51c2893b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 238534 4c6212ceee7d24bcbc795d95bc69e828
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 196974 a9b29abd1bd7f5d1785f3544541eedca
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 1048372 82c9bfc637ebd618304f722095df5c40
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 1740976 0400bbac3c7bbe293e2430299799128a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 160808 110bfbc0ed35dedcd74bf81dfce3c965
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 9160 326fcb48a6d761e7d6fdc3395b6a05d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 76472 2152f88992c83e99b7c6873a2d4e5429
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 53252 0a9985175e890c75d41898fe2a305ff7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 33048 bcc3df2f0b1013c1929e25ee78123640
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 85618 90b6e1f3e431ac12634cfa076eac5bd2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 6018 7954bb0452b484484c6eb1705c23f40d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 8758 e823e4ef623bb5340a0c10d820b0890d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 53588 0c5cedfaa84510004be3540b21780568
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 130770 7e007a7496f3bcaa2b48eb7cac38f5be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 98436 1bbfcdc956a8e8ef4081f8a66d553744
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 77176 58b8471224582c0f06064e11630f65b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 1768402 b16dff64c8931b07180dff1957b6327c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 69552 2ecd40960f5beca9dad68467f7df8179
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 11760 cfc0671977f053bf36c857f98bfe2f1d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 36000 960e928198df9cc14f2b72ac6f87ac25
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 132582 a386519ba722acccea97790bc9b4032d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 38546 4324a6661a6f1969929a1fb36a428125
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb
Size/MD5: 299114 41b70c88021a4251235b931f264f004c
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-52.3_i386.deb
Size/MD5: 3692834 595b8d31f672e6d2b5e94648da587ff7
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-52.3_i386.deb
Size/MD5: 661002 63b1640dc6f25d8bbf442eaeb5e2173e
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-52.3_i386.deb
Size/MD5: 1694452 ec63480260bd4686acf628b8f2d0a4d5
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-52.3_i386.deb
Size/MD5: 1401938 90d1be1d02ca2570e1ff9a53108a1062
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-52_3.11+2.6.15.12-52.3_i386.deb
Size/MD5: 1205122 63e3ce320bcceeb4b493534fd06878c8
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-52.3_i386.deb
Size/MD5: 73654 c5b237fa6f40a5e0c7c936398d10f4c2
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-386_2.6.15.12-52.3_i386.deb
Size/MD5: 8139028 ab19aa5d26256f4a49b2567c575a6f81
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-686_2.6.15.12-52.3_i386.deb
Size/MD5: 7940228 6bc6899225c548f30bb282c6fefbcd29
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-k7_2.6.15.12-52.3_i386.deb
Size/MD5: 7939054 c910ba191cbe2ff1d2d98053fe4cb956
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-386-di_2.6.15.12-52.3_i386.udeb
Size/MD5: 798676 7645cf5367888c041a55cbf5b77b2889
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-386-di_2.6.15.12-52.3_i386.udeb
Size/MD5: 476148 871e3b1a338b99efc146cc9366eb887a
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-52.3_i386.deb
Size/MD5: 148028 25e50651fb1151932866f1acc8e8bfe9
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-52.3_i386.deb
Size/MD5: 140470 cbe30a4e6fa074a07309cff5132626f2
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-52.3_i386.deb
Size/MD5: 3060728 3a15df06c905db7f71f027207c5e88e2
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-52.3_i386.deb
Size/MD5: 4063682 fe3a1277228b560e712727679f593062
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-52.3_i386.deb
Size/MD5: 111310 3fd2866dfad94c7765e6abb204fcb612
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-52.3_i386.deb
Size/MD5: 10557498 51bf0387f432ed54accfa5c826c506fe
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc-smp_2.6.15-52.10_powerpc.deb
Size/MD5: 185626 edd40cd6bcfb7d3b3e7e0c2fad187dc4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc64-smp_2.6.15-52.10_powerpc.deb
Size/MD5: 203454 6f359968188452ef0a9f7a47f2bc906b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc_2.6.15-52.10_powerpc.deb
Size/MD5: 183962 8899aea634394a432632795a0dab6848
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-powerpc-di_2.6.15-52.10_powerpc.udeb
Size/MD5: 98104 2f7a355c7da2fe10c4e09e7b9ff57627
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.10_powerpc.udeb
Size/MD5: 121798 b21635edd66e1723b2613f336da66c8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-powerpc-di_2.6.15-52.10_powerpc.udeb
Size/MD5: 103292 290aefd555053af550427729d243bd34
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.10_powerpc.udeb
Size/MD5: 112204 ee138e7f1bcf34a4521a3e0df2da6aec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 23730 bafae4f6b819e29a91cd933f137dbee6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 25944 e19db8be47babd9bf1499a78d9ff15e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 49308 e146b2a92e8f0e07164a7c9cff823ace
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 51516 9925e90269a01bd21dd3c54ff6642e45
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 2302 c500d101fcce3284f388ba0021517811
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 2478 4fd66e5160f5aae620afe96a8272390f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 40186 da2f5a32687c2f750206d2061dc63f80
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 43754 ed7b4e37cce3baf959c15cdbc2b98bfb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 112598 4a2ff713c81aa3682d62f41d3b6243a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 120652 6271a631ab6ceae1fafb4285f39d5d61
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 40848 88aecdbe93d317449c0ec94131afc1d6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 45942 3eee30e2488a40f350925e08f2ce92a8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 29022 a283d73e23a684b192ae938631669212
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 29894 1a360f1958fcd42894a77c8784eb84f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 211398 becd75f98073840525214ae1c4fafa06
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 225200 058c9c8645b2068508a97f2740f6234c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 45054 2626be12e63debc289a31b51a9034dc8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 40210 3eb61d86887039d2958fcff75b64dec1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1934 1454a948886eea5d833fec5846bd0e6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 2196 c49c45ecafeb391ee281333f4afef63b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 80608 64e955478edb55a6b9c16d3e6ceae72c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 85960 d7b342ae619eecffa1175394541247be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 111632 e550b1816f61b16b4c5144f7a0b35dd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 125776 844c66cbc66605eb82f75e23f339a29f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 53404 faa41b9e613f37a472d120528df77530
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 58476 57cc72611a1491286e1c1dbb2c59683f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 147760 cc53b9050ec43a8be5c2fd324930109c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 161706 dd3b423f109d3a038d69e59428339c36
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 317482 a4585a426ce71864308dfbbb654003c6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 287578 bad62b03eaa33f90e5781ce66418321f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 115852 af781795a328154d7d18723622483c27
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 116516 fba37884eb62c2bb4e3d80be97364328
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1923634 2ad21fe5b3130be19104739d8c21af45
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 2436304 fe1b77572b869ff3581ce308a08328e8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc-smp_2.6.15-52.67_powerpc.deb
Size/MD5: 871692 b53dc4f8bfb05db45bc2b7159bcec9e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc64-smp_2.6.15-52.67_powerpc.deb
Size/MD5: 871228 fd1ff1169304220802a98cabdc359372
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc_2.6.15-52.67_powerpc.deb
Size/MD5: 866352 dfb1f043c87f244459bc0af06126ffa5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_powerpc.deb
Size/MD5: 6943480 1258b9362939477454f7261a4c13d890
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc-smp_2.6.15-52.67_powerpc.deb
Size/MD5: 22774270 3bfefe03a694939bae93a233b64d1f6b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc64-smp_2.6.15-52.67_powerpc.deb
Size/MD5: 23664326 5b31b6d396b849636292e7043a4611a6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc_2.6.15-52.67_powerpc.deb
Size/MD5: 22348144 5213ef717d34a6d8bb4f506f0fec3b26
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 17780 b0e265505fb1bd0453d03edb2cb5426f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 17372 cdd2956b96258f82dbb8f668b464e37c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 261264 1975724b533e96481dd6906fc384a0ff
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 282496 f62273e6089393c90ea51b6f95218280
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 227454 dbc3fe1f8d75dd2973446141b925ce2a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 248664 64c26003076ca1201d79313688cc7039
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1048458 ffc37e2c7ed2f294a02c250e689b54a2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1048580 22a6b57fc17ec95380e8f2f4d72b0af6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1737720 462902297ae37f6e081d6b48e45de15a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1877414 5c369eb9af92233f54092b7cf2825507
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 250930 faac4c4f3b46c3ec3b6bc8e04d800748
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 233674 594d3e744920b4e6cd776b7f20515d49
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 13032 c01ba80cd1249d8af8819276f46d1c5e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 13522 7693bec428e9a07f30070db7df241e89
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 84832 4b8ed4a1b5096797af1c01f42cf1312a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 52186 c9f8e4dbc56681db68d0b1b182c00fbc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 73924 03a0e9b0752b8b8580b9952cd2fba4f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 85838 34bc729811018bd09664fcfeb9d03db6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 6614 9fd2a1d6903afe55930f6669a04cd114
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 7062 e56de4812f4da9b9e1c4741fb5066fdf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 60358 df0a203e8212f473557900df240a9d50
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 70346 c242bb51750263d67282f2bfcab2ac3a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 128538 117433fce2532d394c1b474367c71e6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 157788 d7e5c445c7af7f110588c2bc9f0fb29b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 108036 2815ba8053c87b229ac39933295e2f11
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 126056 7e632cf1ae8fe20130ec287c454dcabf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 87298 60c6c5d3144579569de99ff84450790f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 93304 1951df808f7bc6ae0c36c17bf9fe4b10
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 2013954 7d06ed44aa7beb09a1eb08efb541025f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 1988040 32ec754026d6f8f6ab81dcfaef222b82
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 104106 9af2db11a4ff42e09bab375304b42bbc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 115698 8849c21b901df3bd1a8c920ea7a1324e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 12734 41664c2c832d96647ee317ff21cb782f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 14432 896df8d28f56e236b1a520140829d353
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 39948 108a2f64b5b0b0d4faa9c40c76281a1e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 41464 5f919e671b76f55b57c9d5e0ef79f18e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 149316 ffbd1581cbd0e311836a81dd758ee03a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 168082 74195d6b16d3f930bb8a6a4c10340463
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 42262 925d969199a9002cd81156d4cc3b899f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 44862 1582101a87737c696a538ed0d92fe264
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 320286 ca366a6cd2422bba2ce24e6a8935b4da
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb
Size/MD5: 324716 ee0f3870540ef254de0d9378c66397e3
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-powerpc-smp_2.6.15.12-52.3_powerpc.deb
Size/MD5: 1340274 d3c1ea04d4a5f99b3de867f55e0159b1
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-powerpc_2.6.15.12-52.3_powerpc.deb
Size/MD5: 1335414 6f90faf30c0f0f8dabacd51929cfd0cf
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-powerpc-di_2.6.15.12-52.3_powerpc.udeb
Size/MD5: 798764 4071886c6215c22e4496ab9b8cdfd0e2
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-powerpc-di_2.6.15.12-52.3_powerpc.udeb
Size/MD5: 508404 77282618d7de69192b3454dc6a755413
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-sparc64-smp_2.6.15-52.10_sparc.deb
Size/MD5: 186944 deac3ddc394261c31894b2b350b491d9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-sparc64_2.6.15-52.10_sparc.deb
Size/MD5: 185516 b815ad36987028ff6dcf8e0889e48ae3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-sparc64-di_2.6.15-52.10_sparc.udeb
Size/MD5: 100670 eb4ab70462b50bcf7e614b4b03b88760
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-sparc64-di_2.6.15-52.10_sparc.udeb
Size/MD5: 105832 23739442c690623b0070062ee0ab255a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 50464 2b4cbadad1f1a9b25d98994fd2ef9ad3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 2352 177ea4a5a957fc0af1009f43f5675c47
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 40322 ff3a3117839dd36e8b625ef60863e52a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 110518 e1aa12134ab3fa21bda1a1b87af00703
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 41170 5176277d9c10e5a6714353953d08db38
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 104232 5db5dfeaa4b8550bd7eececbd765e104
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 7432 f7d3b9cb1c8b1a80e8570a8f6a24ef29
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 149016 4099cb20f575606ad7bcad3ec54e5916
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 1707920 68bbd4cda5113476731a2b74cb51dce9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-sparc64-smp_2.6.15-52.67_sparc.deb
Size/MD5: 768974 08ae76621d41766c99741d3c2fe36109
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-sparc64_2.6.15-52.67_sparc.deb
Size/MD5: 764708 14b683cf3884a8117ad68198ea996861
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_sparc.deb
Size/MD5: 6958650 b471540d77edfdf4d81a6168ed3d1910
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-sparc64-smp_2.6.15-52.67_sparc.deb
Size/MD5: 15003738 10899c77cec105edf1f8a9fbe29b9244
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-sparc64_2.6.15-52.67_sparc.deb
Size/MD5: 14821832 a451316e0b171f1cacad49e94638e03d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 7420 77f554ffc62be87d34ca5b82dc2ac6f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 248676 31f51fe66bf5f1eea3555ceae5be642c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 212258 bdbd80ea31dd1eda1b2dcf3f4b321706
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 1048456 c9fb8123dfe5103239b40e775e21ee57
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 1481828 e82ed81cf6cd3bf54fea8055e5c28043
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 10118 67cd4cc9006195c5d51a36b931daafd5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 40178 562aa33225baf0ec83caafdfe73423e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 9360 aa8331b3eaa227b21172bef6a2cc6d99
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 61434 ca7a64fe2897c1fd0222d296b2f80ac8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 163010 85b771d6fdc6b1169d5ab763ae942e0f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 63986 4f889a61f86c3d809e47bce1b48b4aee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 1235084 542ba4933f965846516690eea419dec8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 59350 8342814c277e3041b900a770bb45b59f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 37396 844833e2c84f080810e27fa65e7caba0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb
Size/MD5: 280070 bc70d76611118d743bd7a3e4895e373b
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-sparc64-smp_2.6.15.12-52.3_sparc.deb
Size/MD5: 828134 ff32a8aa76a07003aae33dc835fae59f
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-sparc64_2.6.15.12-52.3_sparc.deb
Size/MD5: 828052 81fa3eb580ecc71da7da9e6e9a34775a
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20_2.6.20-17.12.dsc
Size/MD5: 1830 ee053f39bcc59b701002b82a2f1142b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20_2.6.20-17.12.tar.gz
Size/MD5: 214716 a4ba6d17d1ca9fc3919d6a93c3b93006
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36.diff.gz
Size/MD5: 1605830 f97c70596b4a1c07a42a1f7459c5470b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36.dsc
Size/MD5: 2472 6f8fb4f7127a66e87321c19a4853f91b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20.orig.tar.gz
Size/MD5: 62174876 f19203b2488d943a640abe8f3cd20f57
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6-17.31.diff.gz
Size/MD5: 107789 78e768b26348b89c3990418e43ac1a82
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6-17.31.dsc
Size/MD5: 2683 db1ca1e3fe165edb5686d5c72e5cecab
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6.orig.tar.gz
Size/MD5: 139814900 ab2c852e27c86d11d0156920ca5f8d56
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-doc-2.6.20_2.6.20-17.36_all.deb
Size/MD5: 4878228 eb8bdcbfc83b2bb63fd8b89fdbddcc1e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-kernel-devel_2.6.20-17.36_all.deb
Size/MD5: 86074 51908b87928f5c45caa9e653cd23621e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36_all.deb
Size/MD5: 47829976 380a8bbde35a67a38600479e12ced4f5
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-common_2.6.20.6-17.31_all.deb
Size/MD5: 21782 cb5f5829ce6104fbb47192ee619c3865
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-generic_2.6.20-17.12_amd64.deb
Size/MD5: 84016 046b408466c3ad9cb2963634c15fcaf7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server_2.6.20-17.12_amd64.deb
Size/MD5: 83900 c077d33308773f0d98c7270f631148ec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-generic-di_2.6.20-17.12_amd64.udeb
Size/MD5: 84310 e0063a1e0ac8cd869577ff79e34f0498
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 24498 83d220d8424f7f5dd858a804198d9505
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 202082 4c0872eb2c550fe8de39973db0d98e8e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 39354 2591f7379f4e296433ed8bfead9e2b95
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 50908 928fd03a9ccc2edeb8504d4dd9e47633
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 187506 f6bf3e342f0263535c9ca41f410a8fa9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 34910 dcc7af80943547b0f75299ee5dee5d37
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 644402 d695410618b99ae784fbee8fe1c72345
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 174670 177a305dfc124bb636fd2d5acc663af9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 76422 080143b9afe7d15f3e59095535394ce7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 57888 fc2d61caa7ed5d30e101a102989bc51e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 140010 c608eb9689d31f285c8fc2e2b92d4858
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 277468 35d83db663c60bf2171279255ca65145
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 1904118 1c3f6df9f72926afe461cca5b6926aaf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-generic_2.6.20-17.36_amd64.deb
Size/MD5: 857786 3a3284f60874c75d4641b22cc1034fbe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb
Size/MD5: 857068 8f055119b227038a319b0d1bc6298001
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server_2.6.20-17.36_amd64.deb
Size/MD5: 856470 cded6b39e168be3a267c377744242113
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_amd64.deb
Size/MD5: 8130814 e225cd619d90a28cd2a06448e94fbac1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-generic_2.6.20-17.36_amd64.deb
Size/MD5: 23065906 0bb094b3e3e33dd870d11a24264bebec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server_2.6.20-17.36_amd64.deb
Size/MD5: 23388296 6e4364f4c3e0c83b9227333a63273efb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-generic_2.6.20-17.36_amd64.deb
Size/MD5: 18428992 bfb0e2d482378ce4fd82314938976d14
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server_2.6.20-17.36_amd64.deb
Size/MD5: 18702670 84607703fab1742f0cc794012047413e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_amd64.deb
Size/MD5: 669118 d9c3d7bfb62b823d98b17c0b5808747e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 246430 e1adefaf889dd8b6f7d893cf9ba6e72a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 144482 79e0151386812271e8842e22e1e53e85
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 225134 4fd97d2c39caa88726f4c8f3e69c3af0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 1110528 4a3d2217a7cc1f0ab1d5c871d380e0fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 1754794 dd8aa6f7e4887a33835894b72b830f57
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 140910 716411a33647dacbb9d6f36987616414
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 163384 a9453d5d98d01dacb394f08b974bc5e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 265716 e9d69ef9af3e1b382ed7a93447d54246
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 34300 387b7ce88b201bf30fd85094dacce3cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 38444 30ad6ce1a65789a06c44db484ec2fc40
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 67682 89f6dd1781e6fbb20cabe9d6e3f00f73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 20962 5599c63ef7510aac1462b411a176c961
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 8328 e32be0998506e928aa8bde678536f738
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 54578 6eae6d7521ff4f0cb7dc415a12a7eb2c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 86018 6915f222ab03d798c242b6483499b8d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 322570 a9b6d4c17f077f143b34c43afec20f82
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 1046832 e05164c749d0bf41ac30e373305af62d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 43974 920cce83c5fe4a05913f7da88ccd31ac
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 12018 0506e4f214ab149362b54e5bb4cf69ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 61918 b61a0a87f6fcb62c514dadad3b7ab4e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 377838 7a7bc188d85a8963cd573484c411ea81
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb
Size/MD5: 66658 83ced3e583998815ea676b567d634e1b
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/avm-fritz-kernel-source_3.11+2.6.20.6-17.31_amd64.deb
Size/MD5: 2131262 4223aeb6ce81e492aefe65f54224c44a
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/fglrx-kernel-source_8.34.8+2.6.20.6-17.31_amd64.deb
Size/MD5: 217878 3cae80df9595d6b7f74b006ad973763c
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-lowlatency_2.6.20.6-17.31_amd64.deb
Size/MD5: 13550948 0a272201cfa95745ba7901330809f1fb
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy-dev_1.0.7184+2.6.20.6-17.31_amd64.deb
Size/MD5: 163996 5c317968914b891bee9324f06196bac0
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy_1.0.7184+2.6.20.6-17.31_amd64.deb
Size/MD5: 6069522 51ab4ccd9b011259d5d1e38652e7b825
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-kernel-source_1.0.9631+2.6.20.6-17.31_amd64.deb
Size/MD5: 1860088 159dc95ed774f2500e38614f09bf9df3
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-legacy-kernel-source_1.0.7184+2.6.20.6-17.31_amd64.deb
Size/MD5: 1384748 40c8107290253b0eaa833e03c269dc26
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/avm-fritz-firmware-2.6.20-17_3.11+2.6.20.6-17.31_amd64.deb
Size/MD5: 478354 adef863c988defae88838f04655fdfc1
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/fglrx-control_8.34.8+2.6.20.6-17.31_amd64.deb
Size/MD5: 80422 6fc9d1603c409c335b2c2ba44f709ac0
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-generic_2.6.20.6-17.31_amd64.deb
Size/MD5: 13537128 459552ec904aa5d19def26cc27f2f268
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-generic-di_2.6.20.6-17.31_amd64.udeb
Size/MD5: 966300 fdb989c1ea5c525f5d19d428670270bb
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-generic-di_2.6.20.6-17.31_amd64.udeb
Size/MD5: 1942518 37a0f6de40f21cceed0ed442ec0defe4
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-dev_1.0.9631+2.6.20.6-17.31_amd64.deb
Size/MD5: 176226 342d5577d90cfaa204c7d6bbe4bde381
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new-dev_1.0.9755+2.6.20.6-17.31_amd64.deb
Size/MD5: 176654 b33320a686ca2b8bf2726902decaa904
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new_1.0.9755+2.6.20.6-17.31_amd64.deb
Size/MD5: 8682258 f78d47759f71aab0cc0cd34688c5be1f
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx_1.0.9631+2.6.20.6-17.31_amd64.deb
Size/MD5: 7995534 20d837b318cf3fc366508de6def3f67d
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-new-kernel-source_1.0.9755+2.6.20.6-17.31_amd64.deb
Size/MD5: 2525496 9a28bf56d5d594a60036aad4076a8fb1
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-player-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb
Size/MD5: 1068838 daa14f0e96bc830293c8d33f8ce281d7
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-server-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb
Size/MD5: 1630294 50e4ec261ba923c8141c1be34188b81e
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-tools-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb
Size/MD5: 357824 db0e5a5d2b3168a63ac78661f0f26050
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx-dev_7.1.0-8.34.8+2.6.20.6-17.31_amd64.deb
Size/MD5: 147092 cee36d8e57c8c4308764ccc0eb7f67fb
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx_7.1.0-8.34.8+2.6.20.6-17.31_amd64.deb
Size/MD5: 9822876 d6f3a88b6185f9af8c4fc2c11383516c
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb
Size/MD5: 23127496 7512c6818a2cfb363e6de96c7a0fd933
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb
Size/MD5: 18482084 77c7bb1c7b37a9f180a67a3d4c4c615d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-386_2.6.20-17.12_i386.deb
Size/MD5: 86842 188cca44b7e7428066a02673f719eddb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-generic_2.6.20-17.12_i386.deb
Size/MD5: 87360 e232efb909fa8c310f2c0d7b14ce15d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server-bigiron_2.6.20-17.12_i386.deb
Size/MD5: 87868 f40955e4ca733e6666184c3ca70055e1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server_2.6.20-17.12_i386.deb
Size/MD5: 87818 2ca82b0ef30a59b7c44e7859e6391031
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-386-di_2.6.20-17.12_i386.udeb
Size/MD5: 84182 5e576f3aea901f6140d308474a09c6a0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-generic-di_2.6.20-17.12_i386.udeb
Size/MD5: 84886 38236107ff8f5fe920efc4c8279d1964
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 20326 9164e0834ec52ff52488e431cd540f3a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 22892 cb6a438e822597816ca22eba4d027117
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 210082 1114f0c2617cf8a7e7b12307cb7fdcda
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 212234 b4389be66b9a2de24aa47f1fca764075
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 88686 2b33f5bf88e9cbccdca938a41d024cf0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 35624 af9e722096a6e8bb396d9f5bdf2644c8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 37736 0a3798e29dc9017614910743ff71fe86
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 38408 019a0be0f53df06a8510084404e413cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 45640 764c449147614d444f5bd809cfe741c2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 45798 8451b700451bc4c3fb1fd436e8aff28e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 179460 3ee7930d30e01f2d7ac05fe0ad56d675
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 179826 6bbdde505787788aacad92568ca06b14
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 32100 3958d982992556c2eea54ac8b0aedf75
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 32432 369e2795e856b352702be2c90db9460d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 648592 fef7358c65f78d2f8796780cbec46730
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 667482 c36df77a008193efc98e7dcfe83cbb46
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 178208 5eb5a994fb3dc3d429e8e59dfc5ef870
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 181296 6deb4719a42de6f54f76b83bcec75f80
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 72396 bc422bb9a10152ab919a8d5232cd3646
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 74040 91fecfc61f8b9208abbc4b9542ac5751
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 53576 2f7e777ae61ffd13d738579fc2732d25
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 54782 f9cb368f9476cb00e5ea50e90fea9cf5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 129208 2561a2e204d0f0cf1be3fe933c583cd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 134862 38d76d10a700c21dac765cccb137416d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 275954 b6e9b4df7533754ccc73f4b74b629b34
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 274956 94996c553bf55ea5457c588cb5a8d490
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 1816146 cb9e49c3cf63514cf0e2c8566d34f355
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 1886462 cdaa4d27814274989b6a5083e99d1468
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-386_2.6.20-17.36_i386.deb
Size/MD5: 848474 cf3ef71c1ab7b2d98e4165c9c1f50b95
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-generic_2.6.20-17.36_i386.deb
Size/MD5: 841798 11cc8e6ca8752a4b5aa003256653f673
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb
Size/MD5: 848690 3849d43f5d59f12f9858efa36c2e63a7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb
Size/MD5: 844936 b934d25879e62864a5472939edf41804
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server_2.6.20-17.36_i386.deb
Size/MD5: 842824 a20ea95041deebdf0f3f78677962c120
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_i386.deb
Size/MD5: 8120852 9cf19d50af64fa5402f5ee0b28f2d8b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-386_2.6.20-17.36_i386.deb
Size/MD5: 23747822 05e00a5b92c8095dab78c1869f8c5b92
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-generic_2.6.20-17.36_i386.deb
Size/MD5: 23815004 077ca83a6f88ed749e6f27614c1392a9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb
Size/MD5: 24376484 2b4e84bee148e87c0eb01e032552d4eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server_2.6.20-17.36_i386.deb
Size/MD5: 23866964 2e4c61c3b57ed209bd4e2e6a81a5ae97
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-386_2.6.20-17.36_i386.deb
Size/MD5: 23590486 b90067007b1c07dd79d7284497755547
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-generic_2.6.20-17.36_i386.deb
Size/MD5: 24169290 94ce3aa4d7e7f240e9396b3833d797ed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb
Size/MD5: 25665260 c8e1bd368b1da472152f9fdb024fffbf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server_2.6.20-17.36_i386.deb
Size/MD5: 24395356 1291ec15c480d18c926af098dc86d78a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_i386.deb
Size/MD5: 669136 984e8b38450985659cdde7c8078f62e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 244612 c9fe618b2c386c8a0e3b93c700f846d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 250160 d77ad34335e0332b8ae62f472d04319d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 132546 04cb386d3b29d3f85d97b08fff95c12b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 133070 753d1a7b4118661907b670cc93866118
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 213366 aabe85be12c68a079e03b8781567e506
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 220780 2e08b3d087dc753bae16ad4b9129f871
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 1110422 393e5139ecad7796bc8b72ca03a29731
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 1110530 c36dcc035ef324964739d43ed3730e94
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 1951210 ceb7460c3af74d76337bd3eceafd18f7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 1974680 62564aa09706a756d9061fc141b0379e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 149848 85c4f4be8856a6e29743e1a738d2f933
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 142494 1b4a54e2cd488b1533536e85c0b22d8a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 160754 761a44199326e79f428f93b9bf1de34b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 161952 df5dfac32aac66a50b8015b8bbef1d61
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 252928 9278357037422699cc8d417d831d9719
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 255510 188e6909c6f36c5e92ee0f780bde1367
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 32760 a02f028dd76e530920de4164aa1ef686
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 33328 511c6543e5aa044297a67b62c1c88fa3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 38018 82accd7c72f15c613cddfb318cddadcb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 38314 954c2e9d314276f13d499bff665bfde7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 81850 29805b33afc8664363d142368568df5d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 82108 96aee6a89a0b04ba3e3760db4ddac78e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 47686 6ba37e2bf10918c95db76ac2d417663e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 47708 2ccca5eb028aef1ac3f07078b654e967
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 8258 28b6853ce133922673a62d68359209d8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 8496 05daa9534a6d99cd44b17b62109eb39f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 49948 d5382680a57228bd677edfaece400b3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 51870 09303feef1283d5b2cc31040af2e5270
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 78846 438aaabd87a1ea789fc3be3e33ab8646
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 79490 b0a0f74d52305a342d3bcfb9504181ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 322546 26c7b5500cea5aa9f4e70f3da2f6fef0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 322570 0501a223e9a70712006f13d13431659a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 1362474 f67e3a7dfaa82f5412792bfff3316500
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 1348042 fb9f6d6ccc587b2113876624bcfef226
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 42458 84eb68966a8c2dd68c2b4722efb34bde
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 42232 2c57cdc8bd71b4dce9f1cb1a7308bb52
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 10762 cead5edaa9fd8608035ea7c71cc7cc7c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 11400 93ec5d7e1628428ce1d4fabe4ebd49ee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 55992 4e5e603c5574b3b614b92a640d305c77
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 56890 fca150d57bce6f91574676ce771865ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 360300 bd62f504c6b28fab113f63a96a8fa2ba
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 363212 524d7cfe4ae30d28eb3c2320dd64359c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb
Size/MD5: 63168 450d97c982ac79e92a1bb2f4560be1ea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb
Size/MD5: 63836 13f5e0b9090bd7b2866a46f978360142
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/avm-fritz-kernel-source_3.11+2.6.20.6-17.31_i386.deb
Size/MD5: 3427088 a0644c93a95cbadc3e05a936d07866bf
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/fglrx-kernel-source_8.34.8+2.6.20.6-17.31_i386.deb
Size/MD5: 217868 bb15afa23bee098b2c73ccabf16aeed0
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-lowlatency_2.6.20.6-17.31_i386.deb
Size/MD5: 16103192 933fbffa39a9db8812c197356906e8ba
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy-dev_1.0.7184+2.6.20.6-17.31_i386.deb
Size/MD5: 143102 9323142a37e668ee9f1201250f392f98
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy_1.0.7184+2.6.20.6-17.31_i386.deb
Size/MD5: 3064282 0566dcf2de8751dee79339a5b7d86d90
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-kernel-source_1.0.9631+2.6.20.6-17.31_i386.deb
Size/MD5: 1763250 0f0cb7cb6f68759e3052cdad1f1ca473
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-legacy-kernel-source_1.0.7184+2.6.20.6-17.31_i386.deb
Size/MD5: 1376080 39281eee5e0b5d6ea831675349ee365f
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/avm-fritz-firmware-2.6.20-17_3.11+2.6.20.6-17.31_i386.deb
Size/MD5: 1207908 b07a58f361554e355338ca08d44e8554
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/fglrx-control_8.34.8+2.6.20.6-17.31_i386.deb
Size/MD5: 77680 b30bcb45b4d6f7421ef5fb757554d830
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-386_2.6.20.6-17.31_i386.deb
Size/MD5: 16340226 0e7dd6aacb36a5601e80ba98555edc11
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-generic_2.6.20.6-17.31_i386.deb
Size/MD5: 16096356 77590a41029409066d5093fcdf1127e9
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-386-di_2.6.20.6-17.31_i386.udeb
Size/MD5: 966226 3a154fc15eecb9458f89939015ce51de
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-generic-di_2.6.20.6-17.31_i386.udeb
Size/MD5: 966294 cb62f0ea1152f4c9c890b80e4427521e
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-386-di_2.6.20.6-17.31_i386.udeb
Size/MD5: 2120570 11bc64fd197a751a742a6956ae0fd9a6
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-generic-di_2.6.20.6-17.31_i386.udeb
Size/MD5: 2160580 6d566ca1acbd7fc9b5f795daeeaedd88
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-dev_1.0.9631+2.6.20.6-17.31_i386.deb
Size/MD5: 156130 bd651a0a3892fdc3d5ff187cc0a45488
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new-dev_1.0.9755+2.6.20.6-17.31_i386.deb
Size/MD5: 156600 5a124f9290921dac4d77a349b3ac070e
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new_1.0.9755+2.6.20.6-17.31_i386.deb
Size/MD5: 4833270 1e6deb4cfbd5cbf29d8f79b0e597c454
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx_1.0.9631+2.6.20.6-17.31_i386.deb
Size/MD5: 4492558 c56ab1045d05d8560a41a7b87e2a1c39
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-new-kernel-source_1.0.9755+2.6.20.6-17.31_i386.deb
Size/MD5: 2454162 55179cc72ce26c101aedb84841e1eb08
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-player-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb
Size/MD5: 1666848 ebb6fbab6e18332d046fa0d79abc9c0f
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-server-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb
Size/MD5: 2860690 ae88be47f7596e2c8316f4e3a22377ec
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-tools-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb
Size/MD5: 760492 a392956778451398b8da03b1c79bc051
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx-dev_7.1.0-8.34.8+2.6.20.6-17.31_i386.deb
Size/MD5: 130326 755509fec142e17ce0dd45b9e929064c
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx_7.1.0-8.34.8+2.6.20.6-17.31_i386.deb
Size/MD5: 6143092 6d6f3014f01f78b0dd8783366bc5563f
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb
Size/MD5: 23844798 a165f36a05f57654361b4646218e9e9e
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb
Size/MD5: 24183826 a75c933ed52aa1c39a22bec126889627
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc-smp_2.6.20-17.12_powerpc.deb
Size/MD5: 93372 810566bb7bb90b911ee2dc796e8c6cfd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc64-smp_2.6.20-17.12_powerpc.deb
Size/MD5: 118178 08fecf5875b7515466304a5e556d9c82
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc_2.6.20-17.12_powerpc.deb
Size/MD5: 92842 4d4192118b9b0f015678bfcd21e6445c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-powerpc-di_2.6.20-17.12_powerpc.udeb
Size/MD5: 95164 2c39459a0a423d23a74a52229d48d9cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.12_powerpc.udeb
Size/MD5: 130572 82ae1b3368e8e7779670bd70196cde66
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 328832 592f394abdc8a41de6f89a16aa8dceed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 325582 d502b2644f843efde702815b028c1618
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 41184 31ce69aa1a6c5a51fb21dd2546ddb7d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 47450 6fbc8b234f4b98e3f66d8ff4f187c74c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 219678 9516e67812981692229cc9aba7e9b155
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 239166 7f7662bb24b02f1a44f738354686ae93
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 43654 b44df31b967a80e31758c41e05ef2c09
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 39792 5cfed09a0fa48ce3838b2ba21ba4dad1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 717818 5375198b75e2a9a5d9f410af42d95524
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 776424 83319a673c7c9b10461de0aefd6e988b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 205086 aa0011d2dedf01aa32c1837777c7c2f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 209728 caee4552ea2b0b3d9e43b9610ca91adf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 59226 bd1604cf99df7ca4b0522ba0c1441452
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 66860 a47c0ac4b101a2b40bb2f311424d0515
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 64206 08027501addf0c66a9ea6cfb41227300
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 65330 5e617fdfc44c7335fc985e642d6c4130
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 144094 6ee22538b68ddda69ad8469d03cefec6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 162836 4258bd871f4baf4f81a1d5cc940058e4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 383348 0d6dd42f3a57d99915c48252c47c7c6d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 251812 b7f4e7cd8e7661da5f3c57d67d395420
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 2157764 98a7bbb74cc5e35b7bddc4d8fc12dd35
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 3083674 83e44937cfeecffdef687e70f13b1093
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb
Size/MD5: 864430 7bf3208e87d976b60431d01aa84703d2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb
Size/MD5: 868770 0212168af66d47b1953bf59beb405822
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb
Size/MD5: 862718 0edc424b8e413441e74362954ba58b09
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_powerpc.deb
Size/MD5: 8151920 cc6e385dce05073af3df268acce45ebd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb
Size/MD5: 24517498 cf103d3e1ed625118d0998b12bab86bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb
Size/MD5: 26861638 cbde33235ec6a7a6046ee860176b1593
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb
Size/MD5: 24220490 e556a72ab4e97dfb786e72d740fa2f24
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb
Size/MD5: 2128680 cfe9700869769c505d5b8d1d1c196e4b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb
Size/MD5: 2855084 b3cc89ef46e5e4d06b2653172fe3b283
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb
Size/MD5: 2050182 3bc2e7f25ebe8bea2839aebde16ffcd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_powerpc.deb
Size/MD5: 645210 3c8a7642f76a3bab805c4deb34a7cac0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 253008 447d9c9761dfe18be30d647e1b96ba74
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 295072 a08094ed9b4cdb0b20b4ef07fe6a5496
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 155558 8c9bcba70f826b2c4fb871ebf3a12730
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 168430 19b9a0c1a718af5acaa1a97d28f23450
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 248328 7a33c002d5adebd73837fb91df317c41
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 280138 8d505bd1e195b9b165529180732ca1af
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 1110500 8f0022f1c5e95795aaaa1a07e814957c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 1110660 881fe6e0eaa3db15879e0e893684509d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 1951192 7e74e7050d2af4763c728f9e6f52b8d4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 2253422 13f6832a0289630d2e088812dbe1f8d6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 233498 0e5efa4dc2c1d60f2d63f736dcd3f720
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 223070 da1c37cf1a9665c274cdedb7d7d13dce
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 172914 879737cfde3f122ef489bd0a34e8d1f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 205506 5b476284715dabe07a18acd0365b3f23
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 280976 1c05e11f0c7f33fa2ed6ed13650b396e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 316584 b4c7b3b1ec87ba54dddcc5d7ed85f148
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 44652 92750df6fd5855b3b84539e7ee40bad7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 43410 7de7ea097bbd5b0097c8a8dc21c362b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 41212 85c1a08a0dcc9cdc4999243b4607f277
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 53694 3a9e0e870d09ff29d98ea397eb9ca38f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 72814 f069b8db376da6ba6523c1f1a1744a05
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 85272 6dc2d289a49942a9beba89f338f11bca
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 74542 64495f2bd744e1285c20f04aa7dc3a98
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 29722 26ac6df4a55fd8a7168ded5d445aa891
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 8396 a7dee9e87ee7e13108a2abf55958ee31
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 9878 1c5f8521e8c11ec701f492a2b14d220f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 56170 927213142db35ecd6e22cb7b6c64314e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 67412 3eef4694fda05e830ac9b0d649879387
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 86632 244854a18a5ed03c371bb05b9f2142c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 129200 a76825598a96c16432ed54bbd9288f5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 322566 7f7779fa071fce5f29f59ce076e21853
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 322588 0cafc2b9ef45c349253c52e3de0c5c36
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 1415810 bf842d6db566d7be83f36be0e045cdec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 1345396 0463bf1a542fbf4ecf4ce2e4420a933c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 74242 2b6a9627312c1586aabdcdf4f7c8892b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 83244 6bac15c4400ddefb121c19b440bd30a4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 12020 430e6dd156acd4313105e5e8d808c0ee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 13940 2080831826d60e6e87672ddf66f0c6c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 78350 0b82c56c00c548e9a96c2ca73cec6f2b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 85460 4361070d89cfb39069ea8989da654076
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 398184 3a97b6bc7374983dfd5d99ba425886d8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 445198 85fe66984eccab5882988b168735b544
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 76712 6da01c2a1af08c51050eb89082bc244c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb
Size/MD5: 100188 ba1822b9e7dacd482afa36a1a853db3e
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc-smp_2.6.20.6-17.31_powerpc.deb
Size/MD5: 1295164 bfd9c631a8c1eaf0d77f960052c83dd4
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc64-smp_2.6.20.6-17.31_powerpc.deb
Size/MD5: 998682 a82f0cb709d699144fecad690e04f602
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc_2.6.20.6-17.31_powerpc.deb
Size/MD5: 1292544 1bd7e025d89460f69ad71fcbd8731781
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-powerpc-di_2.6.20.6-17.31_powerpc.udeb
Size/MD5: 966288 8b862192df81aba11c1f6cfe2bd4eee1
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-powerpc-di_2.6.20.6-17.31_powerpc.udeb
Size/MD5: 295204 df056e69d9aa45f76533009d499c6585
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-sparc64-smp_2.6.20-17.12_sparc.deb
Size/MD5: 95642 6d7c17541cee91e8eb06912a9f20a396
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-sparc64_2.6.20-17.12_sparc.deb
Size/MD5: 95344 8db377d069385f539a621e562b2df10b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-sparc64-di_2.6.20-17.12_sparc.udeb
Size/MD5: 99130 2f245b90b8b087f61da2caf49f524fbe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 53734 0680b9f0398d7e48c53e7295c77cab8f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 42158 3da50612014614dac0ab87c946c65e6f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 211716 77368597943d10a9a5586f8a1ecc06db
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 607912 8da7a2b5371fb5f1a302a6e57e4ae95e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 142716 73f99532873b9c75317de0adb7471740
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 51444 f42e7104565f89629799aa413dca2b7b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 37414 12f0474f7342185f4d1b0b587c55f2f3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 151172 086fc37a2e1e76e3022f2254574affc8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 1933034 e1905a3433fad1d9462bea90cdc91535
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb
Size/MD5: 780696 0ec6f4b5e642f0193e6c02ea4465008a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb
Size/MD5: 776890 0e303a6399f5d569ee7984a2b010c500
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_sparc.deb
Size/MD5: 8122866 d8d4552de1aa0078c02c0e428b6dd48a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb
Size/MD5: 16953716 0b6bcacad41c64b40fa2d3b97557acf3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb
Size/MD5: 16601038 9033c13349be02c8001f47d79888e214
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb
Size/MD5: 2264344 ab3e7e36ec1257d862dd600eff70ccaf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb
Size/MD5: 2178562 67786fc133bf741d728c88ba444d3537
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_sparc.deb
Size/MD5: 700414 8b12ede19495f6b05c30288cfe31f866
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 264342 9906bcc6b5467bf2c1245eca6054eae5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 156570 4191f2a0d742efeccb67443b3945ff44
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 241232 e8523b32012e66d586f5df1cd381ea73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 1110488 174c4c5a9e61867ad11e78dd808f9d42
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 1571838 e2e6a5ffe044c14520e27bcb5f5f47d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 180424 9ba8a77f742b1b835bb1c772ca962e21
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 310072 427ac0b7e51cb2ad23fe0ec83962cc5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 39666 f866b608114c567f28f9289a0d85c393
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 37984 aa56f559318f20f2e417026970a6bb56
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 8646 b4b5071fe7b4ab2e438d7901370dc94f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 59422 9d072776affde02fc4c1a90906ed2353
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 90818 1be13bc72f1ccc91803bba932730c25d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 322570 a483b9ea45cad7ab5c8029e96ea80d4d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 882448 7bb2910febf841cb05000dfd1de8a39f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 9822 b5066195c7efedec27f28e166ee4967f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 290142 732ddc7d6de7127a9b3163a76531473f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb
Size/MD5: 54806 a249da34b1433114facbfda16afb0584
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-sparc64-smp_2.6.20.6-17.31_sparc.deb
Size/MD5: 998636 e5e1018d1febb0a25443a1608d84d3d8
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-sparc64_2.6.20.6-17.31_sparc.deb
Size/MD5: 998568 5dc6e3bd57278f3876e0ac6d1e5ac06a
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22_2.6.22-15.16.dsc
Size/MD5: 2124 215e3f71f504f09cb9d67ba3bce891c9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22_2.6.22-15.16.tar.gz
Size/MD5: 3074102 dcede517498030950f00193fd7636cba
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54.diff.gz
Size/MD5: 3546714 bc3375a85185bb7c896f5373d04f927e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54.dsc
Size/MD5: 2262 6d8aecb432a702d53ad5e15f9fce41d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22.orig.tar.gz
Size/MD5: 56913972 c98e1329975a8a7931ae63bafe39b63a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22_2.6.22-15.39.dsc
Size/MD5: 2224 3fb717a6f4c6ca172730606024026677
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22_2.6.22-15.39.tar.gz
Size/MD5: 6963922 51c929273ac6d58421cec603e65fdbc5
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4-15.11.diff.gz
Size/MD5: 552663 40de07a2a55ec6e25250ef591fa1a70b
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4-15.11.dsc
Size/MD5: 2735 6b99b949b4bdcac45c5ba49caf55d763
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4.orig.tar.gz
Size/MD5: 143875748 ccbf90c68bf682e9df2371cd85c83c86
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-doc-2.6.22_2.6.22-15.54_all.deb
Size/MD5: 4615002 41f0e4a86eb60e4f347677842fc1a7b8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15_2.6.22-15.54_all.deb
Size/MD5: 7777268 5cce85c4b4a889d0cbc9a1b5abb3c9a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-kernel-devel_2.6.22-15.54_all.deb
Size/MD5: 48284 20aff25c6f59f891366b96484814bf10
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54_all.deb
Size/MD5: 45358212 f4fbc3ed3178453493924895e400b616
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-common_2.6.22.4-15.11_all.deb
Size/MD5: 23372 1e08b20ca5d505d55d734e1e1aa7c212
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-generic_2.6.22-15.16_amd64.deb
Size/MD5: 1181490 06a8c108ea3eb048aa7f7ade85b1ead6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-server_2.6.22-15.16_amd64.deb
Size/MD5: 3758 62f7ea6c0cbb542ed06904426dfc097a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-generic-di_2.6.22-15.16_amd64.udeb
Size/MD5: 646 5aed5ef44cf626f067fb5225ef8fccf1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 24800 531185f6ecc73aa2e5be4b792cc4498e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 216562 347e3fa6b1550d55c77537eeb557f89d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 49168 107ddc3f1c939471379d549fa2b0febf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 40034 d7b9a5d8878064b9aa69bcaad29267ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 51758 fd8ed4458bef221560be980e99dd9578
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 87876 75cd9e963aa71a3765bb3316f72757b2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 35848 1328b905ca910427bdb7473f268bce86
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 652046 8edc4095a4e1af4691431bb8c46169dd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 205958 069e62303753e4b075d6143d019e1314
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 55596 409a1ea9cd365c2e54f3bd7dcad681c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 60512 d8cc2ae93537ec154afd9655aeba4cfd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 146252 b33b05e3b2f87bbf0fce5e0a969db483
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 285930 b020b5eec97f02b2b5a7f8cad963a878
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 1947322 62487759486e99cac46c84eb141dcf48
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-generic_2.6.22-15.54_amd64.deb
Size/MD5: 593756 0cfa2f7530954f717b9bca97595e7ea2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-rt_2.6.22-15.54_amd64.deb
Size/MD5: 1165316 0816ef9517f5e049c22437f89add88fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-server_2.6.22-15.54_amd64.deb
Size/MD5: 593956 b508af1ec08db9b68fe53097acb42809
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-xen_2.6.22-15.54_amd64.deb
Size/MD5: 949302 3c49468b650469542a3fc85c9a85d309
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-generic_2.6.22-15.54_amd64.deb
Size/MD5: 17543644 7c467ec6abac34b98b6fc72a5b0a08e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-server_2.6.22-15.54_amd64.deb
Size/MD5: 17586456 947e9312ac817b9aaf36a0bae43af3a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-generic_2.6.22-15.54_amd64.deb
Size/MD5: 18740292 d8f5abc64c06e0d951f00295db516f7d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-server_2.6.22-15.54_amd64.deb
Size/MD5: 19045588 2c29290b72f5dcf8cde1de91b6c8b061
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_amd64.deb
Size/MD5: 653630 06c7f1cab32983620ce58fab3ed12288
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 252194 6490c4cf504d462e965ad16f9326a7e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 150734 52651e2b2ec7a9348bef67b3c8add406
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 236406 d03ab1e8dab84b9818448c6579286a25
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 1449288 149bbcbfb2f4801fd74e251c6dd68ebf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 142738 dbf111770227c3ed685c2a79d028e233
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 148666 f6b788f8348f92f08c5a81a66e7a02cc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 86010 52eca61e95705ecc9e1db45c37ef0d5e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 35446 8942a8ccbe1be9e71f07d109875771c0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 38396 f506ccb2cb0d35c0f36f676cec4ca394
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 70052 773f942a98207464ca5d62c6f955bc98
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 21462 acbac49df228ab72c5ea07d12865bea7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 8658 da2dac3d46f3ea80526ed9a29c83f56c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 56404 0d818ef611df79adaf83e383bcb93b3d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 88010 0de65f917fd1f6dc28018a910fe29fcc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 1101072 474a9588c6c099d13bdd5404860d3c47
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 45206 069e3168b034cd9756e1726e52f401d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 12676 e66b970e6acd7e648a6dd8fa91711913
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 462914 b54bda2ce3b03da51c7b0a48b9a2635f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb
Size/MD5: 71790 ac4a611b906456588036bcc639c354cc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-generic_2.6.22-15.39_amd64.deb
Size/MD5: 3013948 86e7a6e87eddd16d2e9ce82e9ec269a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-server_2.6.22-15.39_amd64.deb
Size/MD5: 3012046 41d80f29a78860b4f323a669a1fb71b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb
Size/MD5: 1048448 a5be33841544473a7cc80eb6cba14766
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb
Size/MD5: 322530 6ec01c4069caf838edc3830ea5b92c85
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb
Size/MD5: 477916 813f8a19f99dcefbe272b17561d22f50
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/avm-fritz-kernel-source_3.11+2.6.22.4-15.11_amd64.deb
Size/MD5: 2134688 59b6823d1adf0dc7ff2dc0155ea21607
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/fglrx-kernel-source_8.37.6+2.6.22.4-15.11_amd64.deb
Size/MD5: 191952 3b03fae1017d369824d7955ba655445c
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-rt_2.6.22.4-15.11_amd64.deb
Size/MD5: 13660818 b3e3951e1a061dff40d3a05d997c30f1
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-xen_2.6.22.4-15.11_amd64.deb
Size/MD5: 9854790 9938d8c957c31d19435a3f8158863f02
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy-dev_1.0.7185+2.6.22.4-15.11_amd64.deb
Size/MD5: 169332 c6f2bf946b8030afe43d6cd74228151f
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy_1.0.7185+2.6.22.4-15.11_amd64.deb
Size/MD5: 6070814 e857a22069a35ed93d2c5efeef1fa10e
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-kernel-source_1.0.9639+2.6.22.4-15.11_amd64.deb
Size/MD5: 1862772 96fbbf557068a82ed152100ef0262672
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-legacy-kernel-source_1.0.7185+2.6.22.4-15.11_amd64.deb
Size/MD5: 1390454 60065b0b590d25df1d6f9a0c0bc1377d
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/avm-fritz-firmware-2.6.22-15_3.11+2.6.22.4-15.11_amd64.deb
Size/MD5: 479942 325f03b109f752ca8789d0c9e186e68c
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/fglrx-control_8.37.6+2.6.22.4-15.11_amd64.deb
Size/MD5: 82088 41d91b8db807afe1807fbd68d7d31556
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-generic_2.6.22.4-15.11_amd64.deb
Size/MD5: 13457086 a7c759a22c8004230c597d2337c56a71
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-generic-di_2.6.22.4-15.11_amd64.udeb
Size/MD5: 766 ddf18ca1250601123959bdedc2d2c79b
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-generic-di_2.6.22.4-15.11_amd64.udeb
Size/MD5: 734 753130cf45e4d916ce3792326662ed90
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-dev_1.0.9639+2.6.22.4-15.11_amd64.deb
Size/MD5: 178324 763f49138f65bcd25344b3165caf624d
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new-dev_100.14.19+2.6.22.4-15.11_amd64.deb
Size/MD5: 158248 da89d68c5bf9bd4a953699b0a7a677c5
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new_100.14.19+2.6.22.4-15.11_amd64.deb
Size/MD5: 8890896 044fcbd4369090fb6ddfef265c68eda0
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx_1.0.9639+2.6.22.4-15.11_amd64.deb
Size/MD5: 7996392 f71195542bcffbd3c5617cd04976dcff
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-new-kernel-source_100.14.19+2.6.22.4-15.11_amd64.deb
Size/MD5: 2279348 cbea5190dcb7ebae1c6cae41f812d43c
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx-dev_7.1.0-8.37.6+2.6.22.4-15.11_amd64.deb
Size/MD5: 67596 6c459900b9d5f076f8db357dd024b33d
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx_7.1.0-8.37.6+2.6.22.4-15.11_amd64.deb
Size/MD5: 12254418 cfd39f34d91e4a48573ded79c6215427
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-rt_2.6.22-15.16_amd64.deb
Size/MD5: 3754 81ca2ccde6e44e42d0acb8b6f4f8d766
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-xen_2.6.22-15.16_amd64.deb
Size/MD5: 3782 76929d77a0fbbb99e401a179efe3d40c
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-rt_2.6.22-15.54_amd64.deb
Size/MD5: 17592292 0cdb657d868402a744dd67acbd9c7b46
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-xen_2.6.22-15.54_amd64.deb
Size/MD5: 17355358 5cf6d90812d22fe685c4930f6ab5b99a
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-rt_2.6.22-15.39_amd64.deb
Size/MD5: 3017126 58a8de462a320964eb37d4713ef063e9
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-xen_2.6.22-15.39_amd64.deb
Size/MD5: 3013834 3b2735bb3fe07a149a0c6d7216c3e08d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-386_2.6.22-15.16_i386.deb
Size/MD5: 3756 38e40f57e2213ec44de12fd1586c9a28
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-generic_2.6.22-15.16_i386.deb
Size/MD5: 1379014 512338d9fa1b651ecbc39b1db0285688
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-server_2.6.22-15.16_i386.deb
Size/MD5: 3768 4c0ab45a0ba5dc56a9006e0797ac8a7f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-386-di_2.6.22-15.16_i386.udeb
Size/MD5: 644 5f31cf301f6b8971e7e8733e85c212db
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-generic-di_2.6.22-15.16_i386.udeb
Size/MD5: 644 df4807c07fdd185f50ef8dc3743bc4bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 20418 0f9de8a6295d16cae1fe7b9d25f4c822
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 23228 5e895d82dd9023b629fef23526464f91
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 211438 5e635a70e6b1d97021164f5a6bd11d51
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 213080 df89aaa52d9017a795bf22dec05ec035
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cdrom-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 89010 2e70caf2aa5cefb7070ec8668212188c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cdrom-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 35754 d7642234f8bd7dea30b36dea8816b934
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 50008 21d399d289ffc1c0a787d6d1814ac7fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 50140 127fa8d9247590932c3bec3d2fba5029
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 37956 3d389edb98991e385f671f0d44178d53
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 38610 f07c2e59ed2764026399ebc28685a107
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 44950 3e9f0f01a37259c48855afbfc5043f26
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 45204 60ed4bebdd8f793b28687067956b6460
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 85328 a1340f905e08fabee46c8c643fdaa5f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 85656 ca69911c4bdab605ba471592f9b22d24
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 32344 0f9de7030cccebbb73316b74ee81d04d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 32646 201910ec059ef8901a70fc6748648b90
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 640694 5c2e673d57c1a9aecea86edc15a08664
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 659482 c805fd12258be8e0f94c43b9dc5017b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 206054 6b84aacb3a21d7c5ecca022fec9b7758
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 209784 ba33674cfcea7eabc5d3365a4725472c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 52652 b81d9b2a4d891f5176ff23e03c931ac4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 53866 089d7bcd4eecff3ae3cdfa3dae74988e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 55524 cbddfa0961691f5af1e5078f1fbc6341
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 56914 4975e2e7e8a9cf550c7b763390de6353
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 130910 a56c5b5ef04d03fc9d7abe4dd9ad1dd8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 137790 2d9998c3221d20bab47ef3c3c885ca36
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 277866 52a5a0032d93c63d390bde041de9e987
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 276378 364eef19bd824a34498065e9bc011a98
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 1834666 4d1004a88c1f30305467a1151b05caff
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 1905930 521d19edf828d41bda242061f580f39c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-386_2.6.22-15.54_i386.deb
Size/MD5: 579506 e31e25124b45afdea454fa2e5df96981
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-generic_2.6.22-15.54_i386.deb
Size/MD5: 581308 5978bd43dba625bcc0d90d78ea7976f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-rt_2.6.22-15.54_i386.deb
Size/MD5: 1154954 331ef788b8936ca09297278c54fe0a73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-server_2.6.22-15.54_i386.deb
Size/MD5: 581292 d13dfb1538bbeb0406869f9988e63966
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-ume_2.6.22-15.54_i386.deb
Size/MD5: 527716 38db2de69c705b3848b362d6285a78cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-virtual_2.6.22-15.54_i386.deb
Size/MD5: 466996 581eb343942f0753c7021374cf203dd7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-xen_2.6.22-15.54_i386.deb
Size/MD5: 923522 de45312cd1e8ef642be2a1e321719a73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-386_2.6.22-15.54_i386.deb
Size/MD5: 18568374 73fa4b00dea5d4ed59a1bf81b9e7f70c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-generic_2.6.22-15.54_i386.deb
Size/MD5: 18542298 6ed41de04e6b219e5b45a7de205cfe96
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-server_2.6.22-15.54_i386.deb
Size/MD5: 18630526 c0b10915988e225c3978d51a7f94ee71
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-virtual_2.6.22-15.54_i386.deb
Size/MD5: 6704572 fddd05f27808e8e114d958ec6cbe7928
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-386_2.6.22-15.54_i386.deb
Size/MD5: 23478456 6271a25d209b9092e6e266e0d2760c4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-generic_2.6.22-15.54_i386.deb
Size/MD5: 24123012 c4ae07814e5cb34954bcf9af2d065b8f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-server_2.6.22-15.54_i386.deb
Size/MD5: 24388984 8ec3bfe06020cde3427e0a223b5229c6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-virtual_2.6.22-15.54_i386.deb
Size/MD5: 22814866 a6717fed353a6c8db978f2bdaa87dab3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_i386.deb
Size/MD5: 653638 28d2e17c8dd12239709f7d26dfe847d6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 247896 d1913a5288822f9a4c5d8252de2380b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 254864 05670a61ba685422884b35b4b36a849d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 137044 653ab55a5d2fac7514dcfa427a729de4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 137394 5ef931689ae1d45255c7be7042291088
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 221114 e363197d0c5452adfbe718d129b56eb1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 228418 689a74ed0f50826efc882955901d8661
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 1627050 4fc2c87e20fc465fe8819c5835a9bb4b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 1647312 adf8ab86dfd814c0753ca926609a0f28
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 150434 e24b4ec46d62dc664d08bdffa2184239
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 142510 c41820cbdb83d7661351e2d6ab6759c3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 141124 f2890109982c84417b97e4f9b0ec47e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 142488 b307586a011a4b90aacb9d7c0ea7832f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 79274 95f09af1d5d8d44641d95b99f664d743
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 80914 7b3af901119a8f441ce29a39390a0585
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 33340 7f3b5c8fa51fa3511dfbd49d50d86b8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 33872 441b2e45c5ecec67c362122134e19040
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 37978 31e7de73aa0a902ed47777522cee9688
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 38250 653c0b1df6df39d123596f3cdfccff1a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 83258 6dfb13d2cd4481fb354d29b43f1a34d2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 83440 b945199f9b0e767a04e752f7e9a4289e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 48210 7826c79ecf33f121e5f2df228ba901bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 48188 f4694ad1e5f586f83dd577e4c13ee041
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 8188 2e0ad32b18f1bac73aef856de27399dc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 8410 46d5527c5e1c951dd7cf20cfebd00285
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 50454 a2dda1b9a98c02c0f4dfcf14f7352f64
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 52362 17070ff42e9fd0daa887ad2bee2584fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 79486 39c05ac72f00b488c2e4657922fd845a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 79792 f9d1fd2ee477806b6f5f8c6eac8fc433
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 1388110 3d00dfd9e297f0f5c13cb6c216257fbd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 1367550 c167a877b6a66d820c462e1a42c464df
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 43022 ee80c18e4c855f38b300b3298bcac9cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 42490 6e38df6c8dd793414db655b4df862b89
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 11274 457f9450561026c51e7dce62b99492a2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 11860 a005b1cdbcaf9916c60144b96a068a3b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 435680 c410f7c8d57506611fb299d6219b193a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 438856 8442dc0500a51949003790c676c9e6e1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb
Size/MD5: 65898 3518afe7357301623e77d92f29ef7cd1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb
Size/MD5: 66818 b3eee8a3a0e5de1b73abad161b92977a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-386_2.6.22-15.39_i386.deb
Size/MD5: 3043288 ccb4308e0bc160c24707f5854eb2e412
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-generic_2.6.22-15.39_i386.deb
Size/MD5: 3054328 2d56c435cd060b2745a0ca6206366bb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-server_2.6.22-15.39_i386.deb
Size/MD5: 3056128 04a9e15849ffb6ae029d63ebb323a1c0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-virtual_2.6.22-15.39_i386.deb
Size/MD5: 1551418 650f8adbb27269b364282c89c0b24c23
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-386-di_2.6.22-15.39_i386.udeb
Size/MD5: 1048342 919b46aecdba9098a5ae27b479cc1f4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb
Size/MD5: 1048442 931c9093fdc92d6f6634202320559901
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-386-di_2.6.22-15.39_i386.udeb
Size/MD5: 322512 e639c5c2c3439f93a2ae0c37ea28c7b8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb
Size/MD5: 322534 934ae69176bb17670c6f081a1b1a4979
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-386-di_2.6.22-15.39_i386.udeb
Size/MD5: 453408 77a229a8e4d2f83fd56740ac24e655c6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb
Size/MD5: 453002 ab5b8dae55c15f59956c339c2017f3dc
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/avm-fritz-kernel-source_3.11+2.6.22.4-15.11_i386.deb
Size/MD5: 4084628 5c38b21f36b5d04056d0ee3d683630d2
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/fglrx-kernel-source_8.37.6+2.6.22.4-15.11_i386.deb
Size/MD5: 191960 162aecb99815f6b9a339b1299e2973c7
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-rt_2.6.22.4-15.11_i386.deb
Size/MD5: 16791012 ad32c528dee8398448700bc5c132576f
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-xen_2.6.22.4-15.11_i386.deb
Size/MD5: 12658912 4ed7f2b8ecfb4ce974648c7bc8b2c7aa
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy-dev_1.0.7185+2.6.22.4-15.11_i386.deb
Size/MD5: 148548 b712289da5c1c90c3504c49c066ab579
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy_1.0.7185+2.6.22.4-15.11_i386.deb
Size/MD5: 3065766 ec9626779a8a817c329bb84bfcfa5a9c
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-kernel-source_1.0.9639+2.6.22.4-15.11_i386.deb
Size/MD5: 1764500 9aa631e66d1c4cf18369b10ff8361539
http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-legacy-kernel-source_1.0.7185+2.6.22.4-15.11_i386.deb
Size/MD5: 1378112 b2cad4be9641a5ffd6cdf959b9971898
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/avm-fritz-firmware-2.6.22-15_3.11+2.6.22.4-15.11_i386.deb
Size/MD5: 1209490 042181978d41e4e68fd55c90564822ec
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/fglrx-control_8.37.6+2.6.22.4-15.11_i386.deb
Size/MD5: 79368 fe206f7ee03e52a803275d72446ecd1d
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-386_2.6.22.4-15.11_i386.deb
Size/MD5: 16742196 585c649b0be6bfe04c1b07a5a65b86b8
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-generic_2.6.22.4-15.11_i386.deb
Size/MD5: 16533700 efb709c3e9b7d468eb8eb19cd4bd24c1
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-386-di_2.6.22.4-15.11_i386.udeb
Size/MD5: 764 812cbf6f07ef3f8e82a9740b9d8f4833
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-generic-di_2.6.22.4-15.11_i386.udeb
Size/MD5: 766 df205d71cd5d3b82fe07e703042aa7f4
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-386-di_2.6.22.4-15.11_i386.udeb
Size/MD5: 732 4283d253d3cedde341a7a75d530af147
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-generic-di_2.6.22.4-15.11_i386.udeb
Size/MD5: 734 856c774ebdbe8ec4acc0e1a6a9130669
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-dev_1.0.9639+2.6.22.4-15.11_i386.deb
Size/MD5: 158286 c3037f07e6753221e09ffe4afa5cb17a
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new-dev_100.14.19+2.6.22.4-15.11_i386.deb
Size/MD5: 146010 ad9c127bef125b66085db9c7bb0bb547
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new_100.14.19+2.6.22.4-15.11_i386.deb
Size/MD5: 5013914 7a529396a64deb58e8e5beea3941b5b9
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx_1.0.9639+2.6.22.4-15.11_i386.deb
Size/MD5: 4493322 db303977d7fc8fd18a6e2d4eb6c75881
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-new-kernel-source_100.14.19+2.6.22.4-15.11_i386.deb
Size/MD5: 2253080 b9d0c5159b5973755f853087980c37a4
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx-dev_7.1.0-8.37.6+2.6.22.4-15.11_i386.deb
Size/MD5: 67078 c38c30bc72618a411b2b40a07575c3e4
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx_7.1.0-8.37.6+2.6.22.4-15.11_i386.deb
Size/MD5: 8558012 826ec61e79243432e14df3c4fe01c482
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-rt_2.6.22-15.16_i386.deb
Size/MD5: 1379430 890e80ab2cb552da35613c66accdff3d
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-ume_2.6.22-15.16_i386.deb
Size/MD5: 3734 395b2624c54f03633eb87f0cbc97a4ae
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-xen_2.6.22-15.16_i386.deb
Size/MD5: 3770 56a1c5dfbd6840d5bb6dc589e50e59fe
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-rt_2.6.22-15.54_i386.deb
Size/MD5: 18593802 a23697c081e4de446386196207ba172d
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-ume_2.6.22-15.54_i386.deb
Size/MD5: 8651184 5485ade0608249b603b2d29f52796a60
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-xen_2.6.22-15.54_i386.deb
Size/MD5: 17337476 f7c0dc20dd33587cb7170cf9b0547399
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-rt_2.6.22-15.39_i386.deb
Size/MD5: 3067524 cd3cb7109cbbd0276ee4193b47bb925f
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-ume_2.6.22-15.39_i386.deb
Size/MD5: 3049602 578b1c56c65249fd8f2a45c1f35193ff
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-xen_2.6.22-15.39_i386.deb
Size/MD5: 3058274 c933d038855ffac90f36a2f4c4db42fb
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 31564 6ee7cad81861752974ccab8913be4923
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 174622 a7075817c8becfc18ecc3c3909a9bb80
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 47544 b88af59e21f122d1eff2dcd287727ba6
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 34816 850e9452d08f4cbb8b64a51d6ce8dc1a
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 25670 18b1cfc1c9c9b017da1cb5742fc62fdf
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 78152 7f6682322618840f38766edc66b861ef
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 29642 b48d5450abf39b2768d684c240b38b85
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 123420 4def6fc4ff8e55b307db81e27fb762f5
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 68574 e17c91ebd8e489f5a4ca4426925a0aee
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 1394 d2263d8cc68c8150124ca32cbb6ceaa0
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 50900 f37be62f538f6c92ba9179f36435ef16
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 123346 a1622a607060d17717762687be2f1585
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 246236 f729caa2c10a68e4ca7b2c2c4282c99d
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 1534938 f3736b30f419b2cb39c586f58e80404f
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-lpia_2.6.22-15.54_lpia.deb
Size/MD5: 581738 74e64d51193e30694c2a80acdb4a9126
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-lpiacompat_2.6.22-15.54_lpia.deb
Size/MD5: 595466 b51b81f74f87ea19594b4bafe7cc1c9e
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-lpia_2.6.22-15.54_lpia.deb
Size/MD5: 8328860 dd4ef30b143963c15af5cddef259e122
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_lpia.deb
Size/MD5: 625872 496035aabc97f4a9baddf755c4f30eff
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 46924 a532ca40697d5ca69025f1f681987e0b
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 206940 8c33ba7be35ad9051ca16c96895f412c
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 234188 fe8de6cd05a99936cd729308599a3d53
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 124156 6fe418390d62c87d4bd031f3b27e4f8b
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 40326 c182a285e55e30dd4fd9f504a0be6550
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 30656 80a9a3217417ce60c11568d75a9be23a
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 3666 11c3107c1f5a702d27fe2d29e5395deb
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 47230 9894aa9fbc062ca1ced5d3b0949ee1cf
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 15768 c1ac8d8e1979307c2d1e0ef9da348072
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 96662 c44a69eba22367197430d54acaa99580
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 10878 f831fc959d85f492e23caf138fba832f
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 377552 a90580eb48e723f72335402d6e85d7ed
http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb
Size/MD5: 52864 e6f4c21bece42c5ffff4204b818f39cf
http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-lpia_2.6.22.4-15.11_lpia.deb
Size/MD5: 2898792 c9bd2701af313e7910619956ff90964b
http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-lpiacompat_2.6.22.4-15.11_lpia.deb
Size/MD5: 3120354 faad74cdcdd2472127ab808a1c052d10
http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-lpia_2.6.22-15.16_lpia.deb
Size/MD5: 3746 6a5675f03ca203a51233307ec24ee001
http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-lpiacompat_2.6.22-15.16_lpia.deb
Size/MD5: 3772 c6ca093178a288087d42ccac5685182a
http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-lpia-di_2.6.22-15.16_lpia.udeb
Size/MD5: 644 1496fbb995b406bd9cdc2c86c80ea312
http://ports.ubuntu.com/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-lpiacompat_2.6.22-15.54_lpia.deb
Size/MD5: 18529856 30bada6dc184ab15505d0e4574716595
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc-smp_2.6.22-15.16_powerpc.deb
Size/MD5: 3776 a865c756c85227c4b4c99bcdd3527da4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc64-smp_2.6.22-15.16_powerpc.deb
Size/MD5: 3802 aa1096bc346f2f035c958d334b62a6ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc_2.6.22-15.16_powerpc.deb
Size/MD5: 3774 8588158f9ddfb583ab42815497394f5d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-powerpc-di_2.6.22-15.16_powerpc.udeb
Size/MD5: 646 19c2d7fee87ceacc358002a4e1a67367
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.16_powerpc.udeb
Size/MD5: 648 7ef35ae416bf2f80db27596032363462
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 315160 76de8fb0030716726ac881afdf912262
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 331806 945326f8e67dbe67dffca506fe70b68a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 310634 7d32348468e25b6e8161eb1e794dbbc3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 69108 9c0cc6d763c9a26965d95b1016f23366
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 59600 e8ad3dc8e454774b4b48e4d86903b3c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 69124 a9694608ebda5380e1f31c6c6d48a71f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 47626 d4a71e109ab995054184e3880c5f85de
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 41296 3dc951a9e00d2992573df883125c9673
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 47628 ac297004e60d6daac2c5077b4f597af8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 107324 0af8c2548273b734d8d423b27943f1d6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 91162 b7cf64c5781cf1680f0b43984dbb8e8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 107284 da3d9f2d058a9dd6d41a56fed7e5a166
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 40968 498b97586b06155aab845e21b15c6ffc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 44734 93c489df9c18963cfef25f8d848fd702
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 40978 93a3f89c4bae49dbab525f2244ed90f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 773510 5e3337dc062ce47a23744bab9630dd97
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 709242 e9365b33f36e855d6cfd841d97214e52
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 773420 6faf03e36789cc6bc1aa3296a7d4e07c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 243332 f842b8f9ba469616ea848991916f030a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 236400 b02a1eeca0b26e053f752da0d4541996
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 243298 ddf59a7f8b7e1abb0c16d50e5f7f3c5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 53772 8d4cdc627ad212f655fa4771909a2631
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 47384 fca7ed43dba57b56d77c0afb5bc36fed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 53740 8aacab34266a00ac6b864e380f498d23
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 69044 199cb6c932b1c57896e1765bbe4da986
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 62400 a01800fc7c294dd53eaf87f43fbe2330
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 68996 d07d16dc42d5daec47b8f364389d7433
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 166820 95db10ab499ab76aa49ca336ce6c17ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 147482 5d5b81ecf9970e96b48be6eefc8122fa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 166684 ca4a1e06d95a88309fdb93d948b05ae8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 347892 f845d2b1036cf7d96aa1ccc277a7b2ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 385002 bcfa8c06cca8efca21d1661c91890e07
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 347782 d2acb9f168d9403a7f1d6beb3edf80d0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 3204126 e0449de12be613e0ef6f71b33948a26f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 2182774 6b34a7331f66cc6360ee518134b31a9e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 3121074 94b278820db5d9364f3a11332c4bf6f7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-cell_2.6.22-15.54_powerpc.deb
Size/MD5: 658542 224b256989d50b0babe3e046a8a5acd1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc-smp_2.6.22-15.54_powerpc.deb
Size/MD5: 568724 14f0c68ecb1ea96fd589bdf0050c22f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc64-smp_2.6.22-15.54_powerpc.deb
Size/MD5: 572426 1f588c7a9f543e235d4c985a13732fe3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc_2.6.22-15.54_powerpc.deb
Size/MD5: 568282 ed5c8079a439162c175eca4913cb2dd0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-cell_2.6.22-15.54_powerpc.deb
Size/MD5: 19766842 f303b6b54e23c220d5cfbeac66d4faaf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc-smp_2.6.22-15.54_powerpc.deb
Size/MD5: 18708820 3bdb75aaaa8961d3f3730976403cb8e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc64-smp_2.6.22-15.54_powerpc.deb
Size/MD5: 19744780 b9a76ee8362bc970adc9868bcb9b4309
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc_2.6.22-15.54_powerpc.deb
Size/MD5: 18485548 1b1fd19601cb719bf42fc78ceefcb444
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_powerpc.deb
Size/MD5: 629682 790e46628648d1b59b4796a607920d47
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 298656 ae2aae1d23ee9459c3a2c238f62b0c3f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 256442 6b9c9cf85cbf6caf9a904172ab8353bf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 298538 e2e158aa1390c6650dc31f8bc6b666da
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 173322 46bc77ff2c7dfe168a99431aed9543fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 159610 e2562a075799cfd2d38ce8cc4f5b10bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 173266 95e55b6c7f32762abb49f3503aca44ec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 288574 86783294fef9eaecaf0fea407e01378b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 256444 28dcf9ad4907afc1db0cd6ea2da52ce5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 288540 1502f113e0c9f40f3d8a8629467f921a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 1931854 18199bd1925f2e7f7188ee3826dad7d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 1654766 5813c15c304f8e11e7202867d43192b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 1909850 62c123566de18c9a33a1e06ede984735
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 216076 0b3682996152ba06ac5fd6373aa6d735
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 234448 3531ee385f9be4c3616294f69a7bb210
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 224102 f59d04573e8556fd788db3da5fb78a15
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 181652 31e05543b341fa1fd3a2afc1d83fd1cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 153868 7f32b2cb52a3ce4ae228efd44597d130
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 181584 c6b132d7e6f8b4dd0bbeccdc03447a6b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 103632 6645c56a57d8b9b5772c8d375b8e6bcd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 86736 3b0b2786ca7aae2e78027ab51eac2be6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 103494 c569c090e64b3ca81508d060826925c8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 46978 7e539f3deae48b9bb62b10f8cfba97ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 45402 628c4a5fe3245fcb4cb5c4dfe12a2bdc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 46996 da7e8a7ffdec8578333b4945278bad90
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 54468 9e847dace1f6bb96dd4b2a4a68f0a7bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 41570 6a7226a7fb2a98add60fcabfc5dd65ed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 47806 2ef913db23ed334fe01c3000f1d3823c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 87004 431473bc1306e9abadea45405d748f8f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 74054 83b8bc0d89a70f616e47bebd2d4ae188
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 86976 ebe28671e620e988936babd9dcaac03a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 30306 444a504fbe3a928fcf975c1c4de6911f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 76260 bcd35555297c4707bfe4998c78cf1aa9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 30332 0ba859f43a4526a51a02dc97e15845c6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 9952 8f8a952c62200febb47630546ea2f7b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 8458 44b8f28b718470b9a0f6544edf6e7d78
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 9948 9be31362b48f63df01f9eb3bae241200
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 68476 5dfcb2d47d20f04ab2fd730cd00d0e92
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 56868 43a9199173d14b60514cce4e26c04e0d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 68450 4d37835af2ccd7767f65bf5b862182f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 131418 2bbffb08183ef9737b1c7ee7d91c860f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 87806 d1f7fb7a127c3bb5ea17a71f1d47d26b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 131240 f3472f484e00531c8d606deb7dedfe65
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 1432182 11115ebffcd3b842dbbc68f5a3f62b3c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 1441334 73962d3133f94fb2b761326db53c2167
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 1432046 5f35cce2c671c79e10b8cd43bea84d4b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 70948 2d8686184d04697c8be62752cae815ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 75508 d9105ae8e009613e616147e76f780b0a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 84768 fd7f0edf50e458f429f1e87f3055f3ff
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 14532 9a3539e3c59fb397abfc9508f5c9578a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 12536 9c5146c46602c9ead4d328871d3f17af
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 14528 73f06b41f5764ed81468e4d89e97dc0c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 558348 5b80e2fb36c8ff6a55f896a5fb7e2e3d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 492732 29b5a718362fe422c612f72c4da114a0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 549300 4dec89e60b7d7b5060c0cc8455c2c9ac
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 105380 ccfd8dc7b67ffe3abde899289adfc200
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 79662 1b4022ffa935534a726498fce40b4eda
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb
Size/MD5: 104304 02c6251885f3f373d18446b958c2855f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-cell_2.6.22-15.39_powerpc.deb
Size/MD5: 2619590 af8281593571ced37b2129ed2342fccd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc-smp_2.6.22-15.39_powerpc.deb
Size/MD5: 2567378 20bf3027940d1142ad8803732870f36e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc64-smp_2.6.22-15.39_powerpc.deb
Size/MD5: 2620222 8073e56c511e70257e61599e18b5bd5e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc_2.6.22-15.39_powerpc.deb
Size/MD5: 2554464 27d7b5e667ec571d53285d4cbac8f203
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 1048390 d4b1ca0b0ab22138ba04d681dc20f0c3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 1048432 e45f37ec5193154aa04c35fed50fdaee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 1048558 0c6648aa9377a3ccc64477bf5dd08f38
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 322524 0fdea901bdf7b9173d89d49f10648d0f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 322536 5a36968fa11e67940cf88dfec8f5b90a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 322560 63ec46beb37b44f7e901d4a17d4d5002
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 267156 690a55e73215d9bc450caa6b99fc4476
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 220186 7710f01beebe09e0c9bf2cb812991139
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb
Size/MD5: 267210 651e58dc6fce70139c603386c92ff3bb
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc-smp_2.6.22.4-15.11_powerpc.deb
Size/MD5: 1300508 45e687319d4e0d2dac393138e6f2d6c6
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc64-smp_2.6.22.4-15.11_powerpc.deb
Size/MD5: 1002304 9f77a9427eeaea48276c6b68547d824f
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc_2.6.22.4-15.11_powerpc.deb
Size/MD5: 1298454 fc0dcab1f9958209c7f4266bc08de844
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-powerpc-di_2.6.22.4-15.11_powerpc.udeb
Size/MD5: 764 d6233f778dcf936a4a0478aa80409d52
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-powerpc-di_2.6.22.4-15.11_powerpc.udeb
Size/MD5: 734 8505f5c770efe7e12619fc324996c31a
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-sparc64-smp_2.6.22-15.16_sparc.deb
Size/MD5: 3802 e09e7173876354b9a1bb6846e9437b67
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-sparc64_2.6.22-15.16_sparc.deb
Size/MD5: 3772 586b2c371ca1f45ea3513cfa459fa08a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-sparc64-di_2.6.22-15.16_sparc.udeb
Size/MD5: 646 049e8815ed4659bbd756521f44d1b957
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 59312 4c07f24b58ed97db0fb543db5a8d4856
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 68268 a62b0e675c367386a3208a198f127949
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 42130 4b939c9f08fee124425bd784f7bf7d3a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 95330 eb40ad8d594615e788ecf89c529c1561
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 594048 cd592a5479c6d7119a2eabe234aba28c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 169390 703d55b772601b01ef874202350a9549
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 38254 691b333634c543721644e9126fb6f22e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 38648 3c0eca639d2d669846051bc7b3acc3db
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 154606 57fb00f92f0dcc365e0c41540b5efc41
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 1993026 46125df549b3d01d4d8cc9b4356e9fb1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-sparc64-smp_2.6.22-15.54_sparc.deb
Size/MD5: 475654 c92a5bb9e70c8af93c8ba14d222d2b54
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-sparc64_2.6.22-15.54_sparc.deb
Size/MD5: 474486 2c0f22707763247036f715195ea32cb2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-sparc64-smp_2.6.22-15.54_sparc.deb
Size/MD5: 12415598 f88ba6815bda87f9f6bab3b1f08f2c02
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-sparc64_2.6.22-15.54_sparc.deb
Size/MD5: 12179794 406b603b04315995ed3b535149d11ae2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_sparc.deb
Size/MD5: 684538 d20de9a13d35cd857709d8e97110d89a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 265810 e454ac8cfbb55798d897f6b8f915aaec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 159904 f25815be23aae799ff31fb30b0f660ee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 247460 576ba769410c3856461f98143f89064a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 1254066 0ae70dfca4fac5dc7187d025654c811c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 159996 f945e232f58c9a3c54ee4dc317c24005
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 91978 762357557c147272e8227fb1394886f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 40636 bc40eb4e9aaa6c4a798f93a58e4ea196
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 38574 da8bb028537d9379b91be3524de7cfdc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 8646 ecd7b4d5a5cd5ab219902b3cf2f87227
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 60070 4adf7e7028b4fe0cef8a3f463b8c6ba4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 90990 a46723f940c9b17edd69478fba14a9ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 875908 833753a21da42ec786aaf013767c85e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 9762 fa7c339472c4bdfda8b82021c0c45dbf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 369314 55df073f08fb5e80aa5f7211d3585417
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb
Size/MD5: 56888 eb89eaebdec3149988ab5fd1652a116c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-sparc64-smp_2.6.22-15.39_sparc.deb
Size/MD5: 2578980 89f82b147630b1a42234d7a7f428905f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-sparc64_2.6.22-15.39_sparc.deb
Size/MD5: 2568738 a4a1af735ea7160b6f47ef0c749689a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb
Size/MD5: 1048456 ee8f6d236b1ab8877f7fe255c748c082
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb
Size/MD5: 322536 7891ae3bb1a75ad4a68f895e3d8632d0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb
Size/MD5: 227024 7a30e435d568400043ce19e83390e38b
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-sparc64-smp_2.6.22.4-15.11_sparc.deb
Size/MD5: 1002242 96e1f749c39577efa970f85dffb277a7
http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-sparc64_2.6.22.4-15.11_sparc.deb
Size/MD5: 1002138 657b9f2f3b28d2585178c447c7e7745c
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200801-0578", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "eq", "trust": 1.9, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.18.8" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6_test9_cvs" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.18.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.23" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.28" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.13" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.14.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.32" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.14.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.22" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.13.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.13.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.9" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.33" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.18" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.13.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.30" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.14.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.18.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.31" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.26" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.14.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.10" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.18.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.22" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.33.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.19" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.34" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.11.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.15.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.14" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.33.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.14.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.9" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.21" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.17" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.18.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.16" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.12.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.25" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.13.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.17.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.9" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.33.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.16.4" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.11.1" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.52" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.38" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.3" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.8" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.40" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.38" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.59" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.50" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.63" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.32" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.42" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.12" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.45" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.45" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.25" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.57" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.5" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.16" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.66" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.49" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.25" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.26" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.15.7" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.6" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.44" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.30" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.60" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.34.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.39" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.40" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.14" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.39" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.15" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.24_ow1" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.11.3" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.34" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.41" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.18" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.55" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.13.5" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.7" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.11.9" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.68" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.9" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.53" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.17" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.58" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16_rc7" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.62" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.37" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.23_ow2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.56" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.24" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.53" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.0" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.49" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.43" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.34.1" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.36" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.67" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.41" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.33" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.29" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.31" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.29" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.61" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.43" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.6" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.24" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.18.6" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.46" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.35.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.44" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.15" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.0" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.1" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.30" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.36" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.46" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.26" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.14.6" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.54" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.33.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.14.7" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.27" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.18.5" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.22" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.48" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.21" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.11" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.11.10" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.20" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.47" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.11.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.52" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.69" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.51" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.13" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.34" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.13" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.20" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.31" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.11_rc1_bk6" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.48" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.65" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.28" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.28" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.10" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.50" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.27" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.35" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.19" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.10" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.35" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.32" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.22" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.23" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.33" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.64" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.4" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.37" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.18.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.16.47" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.14" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.5.51" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.9_pre5" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.35" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "kernel", "scope": "lt", "trust": 0.8, "vendor": "linux", "version": "version" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "kernel", "scope": "eq", "trust": 0.8, "vendor": "linux", "version": "2.6.24" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.30" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.32" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel -test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.35.3" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34.5" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.30" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel 2.6.18-8.1.8.el5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "kernel -test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.332" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "kernel -test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15-27.48" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "kernel -ow2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.31" }, { "model": "kernel -test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc1", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.4.37" }, { "model": "kernel -test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel -pre9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel -test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.7" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1613" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "aes", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "messaging storage server mss", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "kernel -test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.1" }, { "model": "kernel -test9-cvs", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34.6" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel -test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -ow1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "message networking mn", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "kernel pre7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel -test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1627" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel -test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.32" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "kernel -test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" } ], "sources": [ { "db": "BID", "id": "27555" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "CNNVD", "id": "CNNVD-200801-420" }, { "db": "NVD", "id": "CVE-2007-6694" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9_pre5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:apple:powerpc:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-6694" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cyrill Gorcunov\u203b gorcunov@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-420" } ], "trust": 0.6 }, "cve": "CVE-2007-6694", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-6694", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-30056", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-6694", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200801-420", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-30056", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-30056" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "CNNVD", "id": "CNNVD-200801-420" }, { "db": "NVD", "id": "CVE-2007-6694" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference. The Linux kernel is prone to a local denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected kernel, denying service to legitimate users. \nThis issue affects Linux kernel 2.4.21 through 2.6.18-53 running on the PowerPC architecture. The NFSv4 implementation is one of the distributed file system protocols. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1565-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nMay 1, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : several vulnerabilities\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2007-6694 CVE-2008-0007 CVE-2008-1294 CVE-2008-1375\n\nSeveral local vulnerabilities have been discovered in the Linux kernel\nthat may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-6694\n\n Cyrill Gorcunov reported a NULL pointer dereference in code specific\n to the CHRP PowerPC platforms. \n\nCVE-2008-1294\n\n David Peer discovered that users could escape administrator imposed cpu\n time limitations (RLIMIT_CPU) by setting a limit of 0. \n\nCVE-2008-1375\n\n Alexander Viro discovered a race condition in the directory notification\n subsystem that allows local users to cause a Denial of Service (oops)\n and possibly result in an escalation of priveleges. \n\nFor the stable distribution (etch), this problem has been fixed in version\n2.6.18.dfsg.1-18etch3. \n\nThe unstable (sid) and testing distributions will be fixed soon. \n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.18etch3\n user-mode-linux 2.6.18-1um-2etch.18etch3\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.dsc\n Size/MD5 checksum: 740 950fed7ed7c289cfea9c1b39f0f41bc0\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.dsc\n Size/MD5 checksum: 740 6f6faa132a53e808bcc61823d140290a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.diff.gz\n Size/MD5 checksum: 5395308 ae08d42b58cd3cf93a23fe31615ac2fd\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.dsc\n Size/MD5 checksum: 892 ca5cdee7568704bc9f6c58f786d0daae\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.tar.gz\n Size/MD5 checksum: 55267 981e9a0a1d79b1605164588eef7da492\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.dsc\n Size/MD5 checksum: 5672 4e4714f542968b30b2c3f94e203e1e04\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.tar.gz\n Size/MD5 checksum: 55185 0a46d75b3ced870a96ea41b900f1ecaa\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.diff.gz\n Size/MD5 checksum: 16873 868c1f27ad2c8db782bbd2bdc3618d70\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.dsc\n Size/MD5 checksum: 892 52c602d55bdc301a0622ed8a63745f29\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.diff.gz\n Size/MD5 checksum: 16968 ff99991657e11545a0f557b623962c52\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 3589210 d2033347599e8db12e2446fd75c0ce37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 54558 3362cfa5f1de0c80b1aa96f22d846c7e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 1586214 a496f633c826ce730ce6150dff49209f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 41463452 67e56915cd61f4b0058aa668e284ca8c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 1085670 9c6513bc6e29a63d0aedc8da8958fc3f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 3752262 e2f225858212089b10aa319236d300f3\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 3027694 ef8b352212a8184702407e69cb7046bd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 268330 7b7d0ab15fe537a59c68b35531750739\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 54038 f42aafb19b9fae6445d0581277b60e92\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23531650 8633558cda9f10fbadbc9299dde77575\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 54074 f4b61f5f330a7a2248d91432fa307f41\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 268076 09bdbafb6d32a4d9f8ceab5f1a6c666e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23484202 d14e2e1d8537aa0cb2f2367f6ddd6762\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23844262 0cb427290707d8a59a3afdf68f523e6b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 3052524 4323a32807ee9a2a7f13bc605ef0a9c7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 268772 bcec817953f14a50253dbe83e16d6c70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23462618 f6873f376755c4f29b24d0d11c9d70ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 267446 376df6aed1989d65f8144f8790862e17\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 15260738 6c000df81a113d2d69a9473a3d764f08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 16859134 9480377d14efcd65c7bde090d2c18023\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3357018 fcb1a842f85110b4a37d246621027ad3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 271914 9a7953d1adbcfbbea07a1357450f34a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 15272470 2581dfa79e27ead359eb27642748b3df\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54066 ce821a602278441fb157d2e8dffa7840\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 16820486 a1540f416895111ff4a4f6dc8d5ae2ad\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3191118 dae286014c3a55824e3cb3040948caa4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 271584 5246a3f1ccb78bde203aab0338e90cd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54038 20567a8f59997151900492fbbdb5a5bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54012 fcd8a752e777bf97667914fe658ca440\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3167674 8fed61ce7278a060d600e54481851c2b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3334306 bd7dd1d9b1518e0e52f3d513ad9f7cea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 1650934 92ab0f73f6d2a1699f975ebede812c99\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54034 224990e92d1255bac74a4a540ef8ee15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 271184 4d2dfd603bf61408db599c9a972d6824\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 1682946 a2ccb197f0b4bc35e889a61c095add5e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 272850 4cab43a5199e6764b4857a91aaa52e09\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 7924514 6f93e2c2e0f3e5ddeddb95bd50d560ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 233088 acb0dd092348b024f08e0fc2467c31f3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 54104 1437f25c10919b2f944295b8d7f168d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 54064 1afdbacaa80466a4705a9b7ef50a4a9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 239810 542097b2625db36fa56dfd7a29b66f37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 233830 e9a09a7d2a3927486adc68e1f1f7f0f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 3410416 dfc64565c01ac1f01784d72a8befa378\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 7566074 822c9f74d2a88f4ac8e94210ecb06752\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 204874 1b773fb8b26f20629b8c868db90c5521\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 5009022 ef23e40a692019b29f03f1ef7c864e12\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 4586924 66c55044ecf936cf08b69e3f78f8318e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 8870890 a5a52727b1e019791b260c65d4793911\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 198750 09c8bda5566b05dd0f969dedfc316d4c\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 10552252 247e3774a6493211af6575531966a8a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 3020374 69fbbe6591cdab73257c9f68bacb63c0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 54044 77f6c66523dba6bb546b28b6b40b51e9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 196344 3ed099784ab8fe2f625462b1689ea7cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 196818 f0d8bbb055a380b4c2b6064bbd9de0ac\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 54068 f91b5aa270a091f57a246e4cf1f6924a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 195368 29352673ddd4364e7dab3f5a1eb6e2d1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 197570 bde8500410397921905e78f71cd68a10\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 11398348 8201e0a1b33c60d737fb2821dadb8d18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 10999924 6a0b08925946b094d1638ca20095df15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 11806360 7e63ef04531d59c2e3d0c93893d09bf0\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16376092 f7e958b27f039bb044d46f94cc0c9231\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54014 593ee26c9bed3b3c853511c6bbbd13ea\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2_i386.deb\n Size/MD5 checksum: 25583354 6cc7cc34a241783bb8f3b2c9da7595a2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 278502 0f7f0e13f78438eeb1a939a637b8070c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16466936 99c66acfa3cd0c109f0d3e2eaedf8877\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 279716 62626201a89882bab17d10ce706b2df5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 14289932 049b2b4696e9cbeec20ec8c2056c7185\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 277596 042152b79d08eea568fd7481b4849386\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16507076 a1a5845401d351c6fa1f380565bcb5d6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16190600 6c50e29e1616140b367e626c93db2ae4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 271900 8d74262b41e039125ce896f8e8d2f8bd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 272690 94db026fc7d498b48c5ac0b504f63390\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 1299670 879785b1ee5f4ef0bec7423e5c7599e9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 14279230 3101d59c0d8ad8bf617f4d0eefbbb7de\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54088 e23a1d89d0f998caed5b594c5762dc19\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54032 d7b04d8d6f7a0d43579a499e4e0b681b\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2_i386.deb\n Size/MD5 checksum: 5518204 0ce72fa3c9dfd208b1afa6912ffbcc3d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16336828 0780d6d13e90466249f83e6d72ce1780\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3_i386.deb\n Size/MD5 checksum: 5518218 b86648769c5d3db2eb79b1bf6d490c50\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3148608 633afcaaeb9d655b8bde34977bfd0bd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 272236 a611f8a0301e945ce72af3610bc05350\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3054330 6cfae664f54be8c9ed3958c003f404c9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3167916 756a4eed5e44d0530c5f20a7bc80d3d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 279366 357140fdeff990683639e8f290593b0c\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3_i386.deb\n Size/MD5 checksum: 25583596 f0c6d87c849d5384be99dba70d34fb0d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 282728 a6b21a6fc38381b3884b2d2cd052d306\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16836766 be9c22427d5666a80bf96e4c6501ebf7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54030 125894b7dd2b90ba5f48de2e7f04518b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 1326708 add492f75bb0337e6e69a4afb73114c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16404432 9411c28cfbb27329417aa28b32de764c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3170704 6b86d80969e7f62ceaae5ee5af7f1a5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 279198 92c75044e071977263a20c444ee655d0\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 255464 ad4b1e9a12ca70ebb46a4c0f77bb62bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 28013676 bacb3a11176542aa961867eaac8539d3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 28181506 d0c75846976e8ebcd8baf1ee64a46414\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 54036 746e70c193f28c412acec61cf63e4572\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 54050 fa3dc6c7671185e9ce4f7a00783990dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 3081858 970b72442606e4878d77a274d4fa4306\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 255414 885054343ab6670ce1d90f7bdda61ef2\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 167030 7bce3329b9fc5d10faafecfac21bc70a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 186870 37e9b246abeb84886cd9a6215187f229\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 8309262 893346de1a07ed015320fe333fc41037\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 15653182 1938128d29990cc16bc3f829d3fa1cbf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 6125514 e6842c7aedc7b70d5a4a5d8e624e9627\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 162870 5ebcff098fd97c89bc0f3057f68c3e31\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 54110 9408231d8eb91431b2ca495f1e94f3cb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 54054 ed109dbb8bf134256164d6d07bd061f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 3413590 6013078ea705dbf5367d284f6ae401a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 154266 e5775b643e07055ec7121815d9316e62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 186682 9027d5504f2739d64d1bb4111ec5e136\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 15677870 4b5a1f2e56c587a0d470ea17fab07647\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 9075438 02f535440d5018de7b6233b232aa04de\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 9863510 a6c8def78ca64e8e8b6ef10533186d30\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 149960 2e09d53e58663189a043b7d7493cec8e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 5926528 cb0dfe477608a2da181596f9b78ceddc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 155716 76a619c24cc74cfe22ab42f9f2964096\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 54040 affef50872a733868e2e3d58d566993a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 155772 dd2d75f96ee5dd4c7a7ff8250f631649\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 182490 f6be30e57bbff0ecace79826d4474bb3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 5941862 45689ea22cb4ebdfb71936f79e00eebe\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 178194 4baf9d4d2fed0b5e3f12add06fae014b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 3350066 4938243e89da8ace26c47d00bc60acf1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 182706 84024a93ebcd9d394f179c8ee254ef1b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 15053292 024f0d5e1fbaf5c7d5664aca87ac8741\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 54102 d25d6e1de865a3da93959dd8f8034d7f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 6027404 26b3c01fd8f1c798189c1ee5ec44d11c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 15030096 69c0f1d1c25f49c3201a0b3edc1873b0\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 16402406 7f918a1714d84f8ccb6aaf1a13fc518e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 17016786 c06998d5b9b3c192bde5ecc4119830a1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 54088 3683bf42ff1af3009202bf4c6a0e30cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 16626352 37c3c60edcd7f7b22ededfcda073b5a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 251358 20ade66e354f4473ff045bb0e4e2f7c5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 229986 a6996ddd8cd1f5439aecfc4693ab83f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 54036 d451146b15c05d5d630f72a3399a3464\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 253356 69fd6bca694ce1aea2788658eb530d3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 18348404 6899ee7990a534276f4c98970a05a843\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 3414514 54cad7ae1cd248f0125aa12c9823f0c7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 18293832 2025add962d50482de362ee202f8bb79\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 252806 ed8f3ba9ab6384096d25204af0594ed1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 3392288 02cba07fa4ab35192737f7a40907cf53\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 16969082 d986973f5c4d0e577b169c96ffa0cec4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 15157518 c3ae440ddcd66b9aaa80260824f91967\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 253230 4d2e3ce370d0c3caf798cfee0dfc44d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 246254 fa91c1654d4f46128856838066eb11bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 252272 5eda39b6177f4e66f082c06a159f5719\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 54058 9e8a26d5500ffcd7a6a29dfac6d570b8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 54032 350d6fe5dcfdefcc6f92e364f0ffba3f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 5401990 4af4cf18cb011bb00bb882f7a03c9a21\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 143264 76db142c20b22a4d0847f6309e0a10da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 2966014 81cfb914839c4709399e25ffe9eb2cb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 143688 4291bc7d9865c2842a181b22a7992188\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 5661534 8f7661bfe58017b2e3aa2eb9ca3ffadd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 1438796 18d9f041343153cf48f441eeed112885\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 5619704 7213d869d6e23933ae5e55c87fade8f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 144632 5df45b01064fc7de2106e8b532946cb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 2942938 7dcac05e6588849c7491ef1004759f39\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 3168126 ef5277a44be4e2fb95d7f7feca1cc568\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 165126 8d82f98016c375c250105791051e3021\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 6411270 7106725061d98e4036d0ebabd01ca7fa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 195102 73419b6d64a68410924a0471f0d3bf62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 10391364 f35ec6950afc88b69fa814d005b68550\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 54046 dbd49273f393e72c21f056d50f94cf02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 3190444 40bc9af5142779024dea09675f833778\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 194260 80fdc90e470899b21ae831aaa06702b9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 195828 2036f355f29c418602074540bde81c65\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 10693152 7bef279c0e967019fa5e8a07c1eb4019\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 10647534 197798f662b6e4fc55d0f64dcea6eeff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 54076 8a2d9ac2067a4c8a7b090da06faf4025\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFIGgmwhuANDBmkLRkRAoRpAKCCo/Ja0CkmHW8VQijCHN7Y5l113ACeKR48\n1gWjfQ6MRn5jOphirPT8DZg=\n=22DK\n-----END PGP SIGNATURE-----\n. =========================================================== \nUbuntu Security Notice USN-618-1 June 19, 2008\nlinux-source-2.6.15/20/22 vulnerabilities\nCVE-2007-4571, CVE-2007-5904, CVE-2007-6694, CVE-2008-0007,\nCVE-2008-1294, CVE-2008-1375, CVE-2008-1669\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.04\nUbuntu 7.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n linux-image-2.6.15-52-386 2.6.15-52.67\n linux-image-2.6.15-52-686 2.6.15-52.67\n linux-image-2.6.15-52-amd64-generic 2.6.15-52.67\n linux-image-2.6.15-52-amd64-k8 2.6.15-52.67\n linux-image-2.6.15-52-amd64-server 2.6.15-52.67\n linux-image-2.6.15-52-amd64-xeon 2.6.15-52.67\n linux-image-2.6.15-52-hppa32 2.6.15-52.67\n linux-image-2.6.15-52-hppa32-smp 2.6.15-52.67\n linux-image-2.6.15-52-hppa64 2.6.15-52.67\n linux-image-2.6.15-52-hppa64-smp 2.6.15-52.67\n linux-image-2.6.15-52-itanium 2.6.15-52.67\n linux-image-2.6.15-52-itanium-smp 2.6.15-52.67\n linux-image-2.6.15-52-k7 2.6.15-52.67\n linux-image-2.6.15-52-mckinley 2.6.15-52.67\n linux-image-2.6.15-52-mckinley-smp 2.6.15-52.67\n linux-image-2.6.15-52-powerpc 2.6.15-52.67\n linux-image-2.6.15-52-powerpc-smp 2.6.15-52.67\n linux-image-2.6.15-52-powerpc64-smp 2.6.15-52.67\n linux-image-2.6.15-52-server 2.6.15-52.67\n linux-image-2.6.15-52-server-bigiron 2.6.15-52.67\n linux-image-2.6.15-52-sparc64 2.6.15-52.67\n linux-image-2.6.15-52-sparc64-smp 2.6.15-52.67\n\nUbuntu 7.04:\n linux-image-2.6.20-17-386 2.6.20-17.36\n linux-image-2.6.20-17-generic 2.6.20-17.36\n linux-image-2.6.20-17-hppa32 2.6.20-17.36\n linux-image-2.6.20-17-hppa64 2.6.20-17.36\n linux-image-2.6.20-17-itanium 2.6.20-17.36\n linux-image-2.6.20-17-lowlatency 2.6.20-17.36\n linux-image-2.6.20-17-mckinley 2.6.20-17.36\n linux-image-2.6.20-17-powerpc 2.6.20-17.36\n linux-image-2.6.20-17-powerpc-smp 2.6.20-17.36\n linux-image-2.6.20-17-powerpc64-smp 2.6.20-17.36\n linux-image-2.6.20-17-server 2.6.20-17.36\n linux-image-2.6.20-17-server-bigiron 2.6.20-17.36\n linux-image-2.6.20-17-sparc64 2.6.20-17.36\n linux-image-2.6.20-17-sparc64-smp 2.6.20-17.36\n\nUbuntu 7.10:\n linux-image-2.6.22-15-386 2.6.22-15.54\n linux-image-2.6.22-15-cell 2.6.22-15.54\n linux-image-2.6.22-15-generic 2.6.22-15.54\n linux-image-2.6.22-15-hppa32 2.6.22-15.54\n linux-image-2.6.22-15-hppa64 2.6.22-15.54\n linux-image-2.6.22-15-itanium 2.6.22-15.54\n linux-image-2.6.22-15-lpia 2.6.22-15.54\n linux-image-2.6.22-15-lpiacompat 2.6.22-15.54\n linux-image-2.6.22-15-mckinley 2.6.22-15.54\n linux-image-2.6.22-15-powerpc 2.6.22-15.54\n linux-image-2.6.22-15-powerpc-smp 2.6.22-15.54\n linux-image-2.6.22-15-powerpc64-smp 2.6.22-15.54\n linux-image-2.6.22-15-rt 2.6.22-15.54\n linux-image-2.6.22-15-server 2.6.22-15.54\n linux-image-2.6.22-15-sparc64 2.6.22-15.54\n linux-image-2.6.22-15-sparc64-smp 2.6.22-15.54\n linux-image-2.6.22-15-ume 2.6.22-15.54\n linux-image-2.6.22-15-virtual 2.6.22-15.54\n linux-image-2.6.22-15-xen 2.6.22-15.54\n\nAfter a standard system upgrade you need to reboot your computer to\neffect the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. If\nyou use linux-restricted-modules, you have to update that package as\nwell to get modules which work with the new kernel version. Unless you\nmanually uninstalled the standard kernel metapackages (e.g. linux-386,\nlinux-powerpc, linux-amd64-generic), a standard system upgrade will\nautomatically perform this as well. \n\nDetails follow:\n\nIt was discovered that the ALSA /proc interface did not write the\ncorrect number of bytes when reporting memory allocations. A local\nattacker might be able to access sensitive kernel memory, leading to\na loss of privacy. (CVE-2007-4571)\n\nMultiple buffer overflows were discovered in the handling of CIFS\nfilesystems. A malicious CIFS server could cause a client system crash\nor possibly execute arbitrary code with kernel privileges. (CVE-2007-5904)\n\nIt was discovered that PowerPC kernels did not correctly handle reporting\ncertain system details. By requesting a specific set of information,\na local attacker could cause a system crash resulting in a denial\nof service. (CVE-2007-6694)\n\nIt was discovered that some device driver fault handlers did not\ncorrectly verify memory ranges. A local attacker could exploit this\nto access sensitive kernel memory, possibly leading to a loss of privacy. \n(CVE-2008-0007)\n\nIt was discovered that CPU resource limits could be bypassed. \nA malicious local user could exploit this to avoid administratively\nimposed resource limits. (CVE-2008-1294)\n\nA race condition was discovered between dnotify fcntl() and close() in\nthe kernel. If a local attacker performed malicious dnotify requests,\nthey could cause memory consumption leading to a denial of service,\nor possibly send arbitrary signals to any process. (CVE-2008-1375)\n\nOn SMP systems, a race condition existed in fcntl(). Local attackers\ncould perform malicious locks, causing system crashes and leading to\na denial of service. (CVE-2008-1669)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15_2.6.15-52.10.dsc\n Size/MD5: 2611 f3dd319890b9704ecc00045636534db7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15_2.6.15-52.10.tar.gz\n Size/MD5: 446767 c94e2a00ecf18fce9dd031ac6e9cd052\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67.diff.gz\n Size/MD5: 2873504 d7723bb11612357b4608e8f60e4b8418\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67.dsc\n Size/MD5: 2374 45557a3d6035adbdd6ed5305b0833105\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz\n Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-52.3.diff.gz\n Size/MD5: 95993 a73703b2df5faf419f59a512078613a2\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-52.3.dsc\n Size/MD5: 3194 c10a6c6c95b0be5c93d4681f2a5759b8\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12.orig.tar.gz\n Size/MD5: 97745908 fb5765cfa2b0fdb06deb54fd6e537772\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-52.67_all.deb\n Size/MD5: 5162896 72f6b6c423959afebb74c6a804c0f388\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-52.67_all.deb\n Size/MD5: 92962 51e59e2666145a31fb4ac47c3d4ab61e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67_all.deb\n Size/MD5: 44740314 06fa6b3c9496839b240aa285a9f85e26\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.12-52.3_all.deb\n Size/MD5: 18452 37a5059b2b5efaa59c7e688a6003c732\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-generic_2.6.15-52.10_amd64.deb\n Size/MD5: 165150 0a73a8b05abfc08043f9e308459a3a9e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-k8_2.6.15-52.10_amd64.deb\n Size/MD5: 165240 50c208a7c25cdf1b13c4edc5703e23b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-server_2.6.15-52.10_amd64.deb\n Size/MD5: 165290 61dc26e3f218600402384d3dd495d6b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-xeon_2.6.15-52.10_amd64.deb\n Size/MD5: 156050 7a9506a56279a9e2f053c931a91cf5d3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-amd64-generic-di_2.6.15-52.10_amd64.udeb\n Size/MD5: 84706 763f0c324d411c838e179af730f45d67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-amd64-generic-di_2.6.15-52.10_amd64.udeb\n Size/MD5: 97394 0117222de0bf93e1a89af25d628d6c16\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 22342 72e3223d194781df52d35571f6325760\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 44764 43dcd9724184cf62e5f9cab54afe1e13\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 2304 4e9ebca859508d6c5464ff9f06e57ade\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 36244 5aaf7d1dbe903fbeeddf3ecfc8901128\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 102284 5065464eff55e17f28a35f5e57a842bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 38874 e26b198e7cc4a18f5797df9f44dd91dd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 49134 4a80334564469d8118821235792f9bef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 176690 9aacdae559d3bc97a2640ce4d58da0f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 36768 8cffcbc067254877445e6105396a5f16\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 142248 4c44b18a12bf86917275670a71cd3720\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 51040 79823112f8894465b411b91357582252\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 140606 d94e572bb96c18f35c3b536042d34a24\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 286872 653ea1a2020706629e7a4ec2abe489d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 97788 6c0387e7d1b0f25d0335a4471931e0be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 1650922 76ec5ee75959713b6a6b1cb18c14d646\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-generic_2.6.15-52.67_amd64.deb\n Size/MD5: 865032 d6c05bd69946a41ff5973f94ff122aa8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-k8_2.6.15-52.67_amd64.deb\n Size/MD5: 869106 ac69148ec23b3387116044527ae22eaf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-server_2.6.15-52.67_amd64.deb\n Size/MD5: 870098 07f513158e47bc6a167d5e535dc0162a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-xeon_2.6.15-52.67_amd64.deb\n Size/MD5: 869108 ff2a239414471590ab6be64c50de8bf2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_amd64.deb\n Size/MD5: 6921780 5fd6888d0cee59933c68eb44aa2c7a73\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-generic_2.6.15-52.67_amd64.deb\n Size/MD5: 20809038 6d59f0d3dfa5f99df35be979b1405a89\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-k8_2.6.15-52.67_amd64.deb\n Size/MD5: 20780064 160dc131a43e31bc0ac8901ca74985b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-server_2.6.15-52.67_amd64.deb\n Size/MD5: 21629596 4069011a19bc0bbf68365146ae33c0aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-xeon_2.6.15-52.67_amd64.deb\n Size/MD5: 19896776 39907bab9abcf29f0bf969d3d402ed0c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 15622 6978c2690730ec2f561763ef5122bcb1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 240352 2ddb4ac8cf58569791230da89a30a9b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 202552 147e6b2684c8db670776a7e168ba0512\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 1048600 5da9db1b27e8954ee79eb80c41eec163\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 1543100 7ae3da3261b08b812d68021e9797f8af\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 161644 8a3bcf8f7850a714858ed668ef5b3976\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 9828 860022b69a682ef0bfa92249055e6e8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 80852 1b447c6d6339da87350b44bf223c7d93\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 49164 2d90f509d7d5ade4b623bc82ac3bea22\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 35158 077981a17ebfe2bbefa3660f208f43b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 70856 4c4c628331820d9ded9e2f8e00ff0ec2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 6216 2652727a590c6e7248d3be4b2e0f838c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 9058 92df3c6ba60457acd1f602696df3aac6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 57874 71fc227183b138479093e72d2dd964c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 123330 19a834fb4cff1ac35b96eb6eec3fa5a6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 101000 e595f2e9f9997f83b7658f0bd7138272\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 79230 59fb1d8c41d9ecaa1c483981dff8c31c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 1594716 2df0dbbe97e5c709125495de80a31c3c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 72278 aeda6dfe658cec5ad60f9580f1c02141\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 12646 612cd82d3c221c2494a95b10a75f03b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 33730 5991265208e2a44916d540822bd1ac9c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 138546 ef8d40670f8aa326b3de679d3843e42e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 38926 5cdd7a00236247e10834b2ca00aa938d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb\n Size/MD5: 278736 3d615d96e1648ed1f8a72b9b770fa847\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-52.3_amd64.deb\n Size/MD5: 2405512 0b06044aefe8becb1d0467f5bfdc247d\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-52.3_amd64.deb\n Size/MD5: 511050 e10b89624f7e210d063a0197902e19eb\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-52.3_amd64.deb\n Size/MD5: 1754564 c5c2d9b0533602e9c3e3de858184a655\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-52.3_amd64.deb\n Size/MD5: 1406452 0ea039bbeca0570589afa2e51744c3c1\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-52_3.11+2.6.15.12-52.3_amd64.deb\n Size/MD5: 475572 4432740400b495606aa776d96ba4ba18\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-52.3_amd64.deb\n Size/MD5: 76748 cc23398150beebe4a1d561bf9ff81706\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-generic_2.6.15.12-52.3_amd64.deb\n Size/MD5: 6861864 0654701d92f5de082562a776d201c110\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-k8_2.6.15.12-52.3_amd64.deb\n Size/MD5: 6861248 3ea71d011938ba44253b417acb105e80\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-xeon_2.6.15.12-52.3_amd64.deb\n Size/MD5: 6837846 6642dc1eff1db10dedd772a63641124a\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-amd64-generic-di_2.6.15.12-52.3_amd64.udeb\n Size/MD5: 798882 0dfab4528cb8a35acaefe9927000f685\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-amd64-generic-di_2.6.15.12-52.3_amd64.udeb\n Size/MD5: 497228 5922e6e6038e6144f2e9643bf8de2287\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-52.3_amd64.deb\n Size/MD5: 167244 eb84a383434ff2a22cc68fb0ca060215\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-52.3_amd64.deb\n Size/MD5: 162302 fa7b1343f60ffbc8298da3bb0f7ac206\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-52.3_amd64.deb\n Size/MD5: 6071704 db1d1a77b262ccd2e7d4bf4212919e1b\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-52.3_amd64.deb\n Size/MD5: 7328604 305ee65ddbd1e715d5c8fc0d2e411db7\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-52.3_amd64.deb\n Size/MD5: 125880 fe13a90e72b74c93432a97c4c2ecf88f\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-52.3_amd64.deb\n Size/MD5: 17297042 88992a1f7adea96330b4b1909a5a0605\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-386_2.6.15-52.10_i386.deb\n Size/MD5: 169386 de66f59240599c189971ff2617a32471\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-686_2.6.15-52.10_i386.deb\n Size/MD5: 177254 c645c75cefa72df027ecf9992a0321d3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-k7_2.6.15-52.10_i386.deb\n Size/MD5: 175374 a78aeb6390f3b9056e0ba884aa7dea73\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-server-bigiron_2.6.15-52.10_i386.deb\n Size/MD5: 178040 ab1e27ab921d3c062af1d83a2711fd26\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-server_2.6.15-52.10_i386.deb\n Size/MD5: 178004 36432e0be482eff2ad7d7b11e3393685\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-386-di_2.6.15-52.10_i386.udeb\n Size/MD5: 90234 532960ad957a474af1d36f22c6f09d45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-386-di_2.6.15-52.10_i386.udeb\n Size/MD5: 90404 47bdb4c98e5bec0e9987190d0abc4ff6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 18968 d4428c28842acd44ebbc900062265429\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 43448 09b66d5cc8ce769329e5cb1f5c5ff88a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 105204 7a968c3b6170d141b0cd6ae69d9ccb57\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 2280 724ecd00ebbddee0cedc950d13e39c7e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 34572 257f312f78de2f814a6909fb11a51be3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 96958 b7e56256c4e585f3d2b6ad110370aebc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 37092 be752e4622e517275a340cff56052a0f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 44060 f2dc9462c8b4fb93e16f0cbbc39b5efb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 167734 762f6dd3391cb3477c7eae7c5cf0ba8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 33928 6685b0652c78ded543a1cf9e49da7c50\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 137840 7698662c1142eb2c2f94b79145ec08ae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 46872 f91472c2465256ba325975329f7ab850\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 132966 0fe968b8f8abfcb323e2834e60c100f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 273450 f16f2f5c2cf9b35f5411785d1c57fc31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 102252 10b945d089d0b473f999afedd1b922aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 1595606 0a4698dbff475bb5b82e70606f207a37\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-386_2.6.15-52.67_i386.deb\n Size/MD5: 859020 2b9ebda6ae3855a7732bd3d3641bd568\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-686_2.6.15-52.67_i386.deb\n Size/MD5: 858486 2e8859c47eb2536c12b47f57d1ebae95\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-k7_2.6.15-52.67_i386.deb\n Size/MD5: 859998 bd6e70b3830d5219e66a5414a1665dc7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-server-bigiron_2.6.15-52.67_i386.deb\n Size/MD5: 864228 d74d9ae20edecf320bb41b2e48c48e79\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-server_2.6.15-52.67_i386.deb\n Size/MD5: 858828 b27f151fa2fbf48ed5b3f5f9899f3adc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_i386.deb\n Size/MD5: 6913986 281a26735bed07a88bcb08df8cbd717e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-386_2.6.15-52.67_i386.deb\n Size/MD5: 21709730 fae2c52a1f4def5d9335feafd8d598cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-686_2.6.15-52.67_i386.deb\n Size/MD5: 22506028 869a8657c02443b272666d8fb1a20a1c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-k7_2.6.15-52.67_i386.deb\n Size/MD5: 22248206 b7c51bd51c0e66825a5bb4b098588756\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-server-bigiron_2.6.15-52.67_i386.deb\n Size/MD5: 23606178 bd2a7c7353793db1baf04eb545a1241d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-server_2.6.15-52.67_i386.deb\n Size/MD5: 23170614 47e400c98cb6f4f1073a7f36842a5753\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 15502 f5a50985b9f50e270313efd51c2893b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 238534 4c6212ceee7d24bcbc795d95bc69e828\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 196974 a9b29abd1bd7f5d1785f3544541eedca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 1048372 82c9bfc637ebd618304f722095df5c40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 1740976 0400bbac3c7bbe293e2430299799128a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 160808 110bfbc0ed35dedcd74bf81dfce3c965\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 9160 326fcb48a6d761e7d6fdc3395b6a05d3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 76472 2152f88992c83e99b7c6873a2d4e5429\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 53252 0a9985175e890c75d41898fe2a305ff7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 33048 bcc3df2f0b1013c1929e25ee78123640\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 85618 90b6e1f3e431ac12634cfa076eac5bd2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 6018 7954bb0452b484484c6eb1705c23f40d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 8758 e823e4ef623bb5340a0c10d820b0890d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 53588 0c5cedfaa84510004be3540b21780568\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 130770 7e007a7496f3bcaa2b48eb7cac38f5be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 98436 1bbfcdc956a8e8ef4081f8a66d553744\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 77176 58b8471224582c0f06064e11630f65b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 1768402 b16dff64c8931b07180dff1957b6327c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 69552 2ecd40960f5beca9dad68467f7df8179\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 11760 cfc0671977f053bf36c857f98bfe2f1d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 36000 960e928198df9cc14f2b72ac6f87ac25\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 132582 a386519ba722acccea97790bc9b4032d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 38546 4324a6661a6f1969929a1fb36a428125\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb\n Size/MD5: 299114 41b70c88021a4251235b931f264f004c\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-52.3_i386.deb\n Size/MD5: 3692834 595b8d31f672e6d2b5e94648da587ff7\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-52.3_i386.deb\n Size/MD5: 661002 63b1640dc6f25d8bbf442eaeb5e2173e\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-52.3_i386.deb\n Size/MD5: 1694452 ec63480260bd4686acf628b8f2d0a4d5\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-52.3_i386.deb\n Size/MD5: 1401938 90d1be1d02ca2570e1ff9a53108a1062\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-52_3.11+2.6.15.12-52.3_i386.deb\n Size/MD5: 1205122 63e3ce320bcceeb4b493534fd06878c8\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-52.3_i386.deb\n Size/MD5: 73654 c5b237fa6f40a5e0c7c936398d10f4c2\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-386_2.6.15.12-52.3_i386.deb\n Size/MD5: 8139028 ab19aa5d26256f4a49b2567c575a6f81\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-686_2.6.15.12-52.3_i386.deb\n Size/MD5: 7940228 6bc6899225c548f30bb282c6fefbcd29\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-k7_2.6.15.12-52.3_i386.deb\n Size/MD5: 7939054 c910ba191cbe2ff1d2d98053fe4cb956\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-386-di_2.6.15.12-52.3_i386.udeb\n Size/MD5: 798676 7645cf5367888c041a55cbf5b77b2889\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-386-di_2.6.15.12-52.3_i386.udeb\n Size/MD5: 476148 871e3b1a338b99efc146cc9366eb887a\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-52.3_i386.deb\n Size/MD5: 148028 25e50651fb1151932866f1acc8e8bfe9\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-52.3_i386.deb\n Size/MD5: 140470 cbe30a4e6fa074a07309cff5132626f2\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-52.3_i386.deb\n Size/MD5: 3060728 3a15df06c905db7f71f027207c5e88e2\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-52.3_i386.deb\n Size/MD5: 4063682 fe3a1277228b560e712727679f593062\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-52.3_i386.deb\n Size/MD5: 111310 3fd2866dfad94c7765e6abb204fcb612\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-52.3_i386.deb\n Size/MD5: 10557498 51bf0387f432ed54accfa5c826c506fe\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc-smp_2.6.15-52.10_powerpc.deb\n Size/MD5: 185626 edd40cd6bcfb7d3b3e7e0c2fad187dc4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc64-smp_2.6.15-52.10_powerpc.deb\n Size/MD5: 203454 6f359968188452ef0a9f7a47f2bc906b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc_2.6.15-52.10_powerpc.deb\n Size/MD5: 183962 8899aea634394a432632795a0dab6848\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-powerpc-di_2.6.15-52.10_powerpc.udeb\n Size/MD5: 98104 2f7a355c7da2fe10c4e09e7b9ff57627\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.10_powerpc.udeb\n Size/MD5: 121798 b21635edd66e1723b2613f336da66c8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-powerpc-di_2.6.15-52.10_powerpc.udeb\n Size/MD5: 103292 290aefd555053af550427729d243bd34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.10_powerpc.udeb\n Size/MD5: 112204 ee138e7f1bcf34a4521a3e0df2da6aec\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 23730 bafae4f6b819e29a91cd933f137dbee6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 25944 e19db8be47babd9bf1499a78d9ff15e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 49308 e146b2a92e8f0e07164a7c9cff823ace\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 51516 9925e90269a01bd21dd3c54ff6642e45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 2302 c500d101fcce3284f388ba0021517811\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 2478 4fd66e5160f5aae620afe96a8272390f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 40186 da2f5a32687c2f750206d2061dc63f80\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 43754 ed7b4e37cce3baf959c15cdbc2b98bfb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 112598 4a2ff713c81aa3682d62f41d3b6243a1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 120652 6271a631ab6ceae1fafb4285f39d5d61\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 40848 88aecdbe93d317449c0ec94131afc1d6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 45942 3eee30e2488a40f350925e08f2ce92a8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 29022 a283d73e23a684b192ae938631669212\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 29894 1a360f1958fcd42894a77c8784eb84f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 211398 becd75f98073840525214ae1c4fafa06\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 225200 058c9c8645b2068508a97f2740f6234c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 45054 2626be12e63debc289a31b51a9034dc8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 40210 3eb61d86887039d2958fcff75b64dec1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1934 1454a948886eea5d833fec5846bd0e6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 2196 c49c45ecafeb391ee281333f4afef63b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 80608 64e955478edb55a6b9c16d3e6ceae72c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 85960 d7b342ae619eecffa1175394541247be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 111632 e550b1816f61b16b4c5144f7a0b35dd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 125776 844c66cbc66605eb82f75e23f339a29f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 53404 faa41b9e613f37a472d120528df77530\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 58476 57cc72611a1491286e1c1dbb2c59683f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 147760 cc53b9050ec43a8be5c2fd324930109c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 161706 dd3b423f109d3a038d69e59428339c36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 317482 a4585a426ce71864308dfbbb654003c6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 287578 bad62b03eaa33f90e5781ce66418321f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 115852 af781795a328154d7d18723622483c27\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 116516 fba37884eb62c2bb4e3d80be97364328\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1923634 2ad21fe5b3130be19104739d8c21af45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 2436304 fe1b77572b869ff3581ce308a08328e8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc-smp_2.6.15-52.67_powerpc.deb\n Size/MD5: 871692 b53dc4f8bfb05db45bc2b7159bcec9e2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc64-smp_2.6.15-52.67_powerpc.deb\n Size/MD5: 871228 fd1ff1169304220802a98cabdc359372\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc_2.6.15-52.67_powerpc.deb\n Size/MD5: 866352 dfb1f043c87f244459bc0af06126ffa5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_powerpc.deb\n Size/MD5: 6943480 1258b9362939477454f7261a4c13d890\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc-smp_2.6.15-52.67_powerpc.deb\n Size/MD5: 22774270 3bfefe03a694939bae93a233b64d1f6b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc64-smp_2.6.15-52.67_powerpc.deb\n Size/MD5: 23664326 5b31b6d396b849636292e7043a4611a6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc_2.6.15-52.67_powerpc.deb\n Size/MD5: 22348144 5213ef717d34a6d8bb4f506f0fec3b26\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 17780 b0e265505fb1bd0453d03edb2cb5426f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 17372 cdd2956b96258f82dbb8f668b464e37c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 261264 1975724b533e96481dd6906fc384a0ff\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 282496 f62273e6089393c90ea51b6f95218280\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 227454 dbc3fe1f8d75dd2973446141b925ce2a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 248664 64c26003076ca1201d79313688cc7039\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1048458 ffc37e2c7ed2f294a02c250e689b54a2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1048580 22a6b57fc17ec95380e8f2f4d72b0af6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1737720 462902297ae37f6e081d6b48e45de15a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1877414 5c369eb9af92233f54092b7cf2825507\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 250930 faac4c4f3b46c3ec3b6bc8e04d800748\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 233674 594d3e744920b4e6cd776b7f20515d49\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 13032 c01ba80cd1249d8af8819276f46d1c5e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 13522 7693bec428e9a07f30070db7df241e89\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 84832 4b8ed4a1b5096797af1c01f42cf1312a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 52186 c9f8e4dbc56681db68d0b1b182c00fbc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 73924 03a0e9b0752b8b8580b9952cd2fba4f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 85838 34bc729811018bd09664fcfeb9d03db6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 6614 9fd2a1d6903afe55930f6669a04cd114\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 7062 e56de4812f4da9b9e1c4741fb5066fdf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 60358 df0a203e8212f473557900df240a9d50\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 70346 c242bb51750263d67282f2bfcab2ac3a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 128538 117433fce2532d394c1b474367c71e6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 157788 d7e5c445c7af7f110588c2bc9f0fb29b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 108036 2815ba8053c87b229ac39933295e2f11\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 126056 7e632cf1ae8fe20130ec287c454dcabf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 87298 60c6c5d3144579569de99ff84450790f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 93304 1951df808f7bc6ae0c36c17bf9fe4b10\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 2013954 7d06ed44aa7beb09a1eb08efb541025f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 1988040 32ec754026d6f8f6ab81dcfaef222b82\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 104106 9af2db11a4ff42e09bab375304b42bbc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 115698 8849c21b901df3bd1a8c920ea7a1324e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 12734 41664c2c832d96647ee317ff21cb782f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 14432 896df8d28f56e236b1a520140829d353\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 39948 108a2f64b5b0b0d4faa9c40c76281a1e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 41464 5f919e671b76f55b57c9d5e0ef79f18e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 149316 ffbd1581cbd0e311836a81dd758ee03a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 168082 74195d6b16d3f930bb8a6a4c10340463\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 42262 925d969199a9002cd81156d4cc3b899f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 44862 1582101a87737c696a538ed0d92fe264\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 320286 ca366a6cd2422bba2ce24e6a8935b4da\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb\n Size/MD5: 324716 ee0f3870540ef254de0d9378c66397e3\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-powerpc-smp_2.6.15.12-52.3_powerpc.deb\n Size/MD5: 1340274 d3c1ea04d4a5f99b3de867f55e0159b1\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-powerpc_2.6.15.12-52.3_powerpc.deb\n Size/MD5: 1335414 6f90faf30c0f0f8dabacd51929cfd0cf\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-powerpc-di_2.6.15.12-52.3_powerpc.udeb\n Size/MD5: 798764 4071886c6215c22e4496ab9b8cdfd0e2\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-powerpc-di_2.6.15.12-52.3_powerpc.udeb\n Size/MD5: 508404 77282618d7de69192b3454dc6a755413\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-sparc64-smp_2.6.15-52.10_sparc.deb\n Size/MD5: 186944 deac3ddc394261c31894b2b350b491d9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-sparc64_2.6.15-52.10_sparc.deb\n Size/MD5: 185516 b815ad36987028ff6dcf8e0889e48ae3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-sparc64-di_2.6.15-52.10_sparc.udeb\n Size/MD5: 100670 eb4ab70462b50bcf7e614b4b03b88760\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-sparc64-di_2.6.15-52.10_sparc.udeb\n Size/MD5: 105832 23739442c690623b0070062ee0ab255a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 50464 2b4cbadad1f1a9b25d98994fd2ef9ad3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 2352 177ea4a5a957fc0af1009f43f5675c47\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 40322 ff3a3117839dd36e8b625ef60863e52a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 110518 e1aa12134ab3fa21bda1a1b87af00703\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 41170 5176277d9c10e5a6714353953d08db38\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 104232 5db5dfeaa4b8550bd7eececbd765e104\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 7432 f7d3b9cb1c8b1a80e8570a8f6a24ef29\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 149016 4099cb20f575606ad7bcad3ec54e5916\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 1707920 68bbd4cda5113476731a2b74cb51dce9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-sparc64-smp_2.6.15-52.67_sparc.deb\n Size/MD5: 768974 08ae76621d41766c99741d3c2fe36109\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-sparc64_2.6.15-52.67_sparc.deb\n Size/MD5: 764708 14b683cf3884a8117ad68198ea996861\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_sparc.deb\n Size/MD5: 6958650 b471540d77edfdf4d81a6168ed3d1910\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-sparc64-smp_2.6.15-52.67_sparc.deb\n Size/MD5: 15003738 10899c77cec105edf1f8a9fbe29b9244\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-sparc64_2.6.15-52.67_sparc.deb\n Size/MD5: 14821832 a451316e0b171f1cacad49e94638e03d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 7420 77f554ffc62be87d34ca5b82dc2ac6f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 248676 31f51fe66bf5f1eea3555ceae5be642c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 212258 bdbd80ea31dd1eda1b2dcf3f4b321706\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 1048456 c9fb8123dfe5103239b40e775e21ee57\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 1481828 e82ed81cf6cd3bf54fea8055e5c28043\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 10118 67cd4cc9006195c5d51a36b931daafd5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 40178 562aa33225baf0ec83caafdfe73423e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 9360 aa8331b3eaa227b21172bef6a2cc6d99\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 61434 ca7a64fe2897c1fd0222d296b2f80ac8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 163010 85b771d6fdc6b1169d5ab763ae942e0f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 63986 4f889a61f86c3d809e47bce1b48b4aee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 1235084 542ba4933f965846516690eea419dec8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 59350 8342814c277e3041b900a770bb45b59f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 37396 844833e2c84f080810e27fa65e7caba0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb\n Size/MD5: 280070 bc70d76611118d743bd7a3e4895e373b\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-sparc64-smp_2.6.15.12-52.3_sparc.deb\n Size/MD5: 828134 ff32a8aa76a07003aae33dc835fae59f\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-sparc64_2.6.15.12-52.3_sparc.deb\n Size/MD5: 828052 81fa3eb580ecc71da7da9e6e9a34775a\n\nUpdated packages for Ubuntu 7.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20_2.6.20-17.12.dsc\n Size/MD5: 1830 ee053f39bcc59b701002b82a2f1142b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20_2.6.20-17.12.tar.gz\n Size/MD5: 214716 a4ba6d17d1ca9fc3919d6a93c3b93006\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36.diff.gz\n Size/MD5: 1605830 f97c70596b4a1c07a42a1f7459c5470b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36.dsc\n Size/MD5: 2472 6f8fb4f7127a66e87321c19a4853f91b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20.orig.tar.gz\n Size/MD5: 62174876 f19203b2488d943a640abe8f3cd20f57\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6-17.31.diff.gz\n Size/MD5: 107789 78e768b26348b89c3990418e43ac1a82\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6-17.31.dsc\n Size/MD5: 2683 db1ca1e3fe165edb5686d5c72e5cecab\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6.orig.tar.gz\n Size/MD5: 139814900 ab2c852e27c86d11d0156920ca5f8d56\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-doc-2.6.20_2.6.20-17.36_all.deb\n Size/MD5: 4878228 eb8bdcbfc83b2bb63fd8b89fdbddcc1e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-kernel-devel_2.6.20-17.36_all.deb\n Size/MD5: 86074 51908b87928f5c45caa9e653cd23621e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36_all.deb\n Size/MD5: 47829976 380a8bbde35a67a38600479e12ced4f5\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-common_2.6.20.6-17.31_all.deb\n Size/MD5: 21782 cb5f5829ce6104fbb47192ee619c3865\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-generic_2.6.20-17.12_amd64.deb\n Size/MD5: 84016 046b408466c3ad9cb2963634c15fcaf7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server_2.6.20-17.12_amd64.deb\n Size/MD5: 83900 c077d33308773f0d98c7270f631148ec\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-generic-di_2.6.20-17.12_amd64.udeb\n Size/MD5: 84310 e0063a1e0ac8cd869577ff79e34f0498\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 24498 83d220d8424f7f5dd858a804198d9505\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 202082 4c0872eb2c550fe8de39973db0d98e8e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 39354 2591f7379f4e296433ed8bfead9e2b95\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 50908 928fd03a9ccc2edeb8504d4dd9e47633\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 187506 f6bf3e342f0263535c9ca41f410a8fa9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 34910 dcc7af80943547b0f75299ee5dee5d37\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 644402 d695410618b99ae784fbee8fe1c72345\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 174670 177a305dfc124bb636fd2d5acc663af9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 76422 080143b9afe7d15f3e59095535394ce7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 57888 fc2d61caa7ed5d30e101a102989bc51e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 140010 c608eb9689d31f285c8fc2e2b92d4858\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 277468 35d83db663c60bf2171279255ca65145\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 1904118 1c3f6df9f72926afe461cca5b6926aaf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-generic_2.6.20-17.36_amd64.deb\n Size/MD5: 857786 3a3284f60874c75d4641b22cc1034fbe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb\n Size/MD5: 857068 8f055119b227038a319b0d1bc6298001\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server_2.6.20-17.36_amd64.deb\n Size/MD5: 856470 cded6b39e168be3a267c377744242113\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_amd64.deb\n Size/MD5: 8130814 e225cd619d90a28cd2a06448e94fbac1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-generic_2.6.20-17.36_amd64.deb\n Size/MD5: 23065906 0bb094b3e3e33dd870d11a24264bebec\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server_2.6.20-17.36_amd64.deb\n Size/MD5: 23388296 6e4364f4c3e0c83b9227333a63273efb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-generic_2.6.20-17.36_amd64.deb\n Size/MD5: 18428992 bfb0e2d482378ce4fd82314938976d14\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server_2.6.20-17.36_amd64.deb\n Size/MD5: 18702670 84607703fab1742f0cc794012047413e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_amd64.deb\n Size/MD5: 669118 d9c3d7bfb62b823d98b17c0b5808747e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 246430 e1adefaf889dd8b6f7d893cf9ba6e72a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 144482 79e0151386812271e8842e22e1e53e85\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 225134 4fd97d2c39caa88726f4c8f3e69c3af0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 1110528 4a3d2217a7cc1f0ab1d5c871d380e0fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 1754794 dd8aa6f7e4887a33835894b72b830f57\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 140910 716411a33647dacbb9d6f36987616414\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 163384 a9453d5d98d01dacb394f08b974bc5e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 265716 e9d69ef9af3e1b382ed7a93447d54246\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 34300 387b7ce88b201bf30fd85094dacce3cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 38444 30ad6ce1a65789a06c44db484ec2fc40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 67682 89f6dd1781e6fbb20cabe9d6e3f00f73\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 20962 5599c63ef7510aac1462b411a176c961\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 8328 e32be0998506e928aa8bde678536f738\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 54578 6eae6d7521ff4f0cb7dc415a12a7eb2c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 86018 6915f222ab03d798c242b6483499b8d1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 322570 a9b6d4c17f077f143b34c43afec20f82\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 1046832 e05164c749d0bf41ac30e373305af62d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 43974 920cce83c5fe4a05913f7da88ccd31ac\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 12018 0506e4f214ab149362b54e5bb4cf69ae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 61918 b61a0a87f6fcb62c514dadad3b7ab4e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 377838 7a7bc188d85a8963cd573484c411ea81\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb\n Size/MD5: 66658 83ced3e583998815ea676b567d634e1b\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/avm-fritz-kernel-source_3.11+2.6.20.6-17.31_amd64.deb\n Size/MD5: 2131262 4223aeb6ce81e492aefe65f54224c44a\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/fglrx-kernel-source_8.34.8+2.6.20.6-17.31_amd64.deb\n Size/MD5: 217878 3cae80df9595d6b7f74b006ad973763c\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-lowlatency_2.6.20.6-17.31_amd64.deb\n Size/MD5: 13550948 0a272201cfa95745ba7901330809f1fb\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy-dev_1.0.7184+2.6.20.6-17.31_amd64.deb\n Size/MD5: 163996 5c317968914b891bee9324f06196bac0\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy_1.0.7184+2.6.20.6-17.31_amd64.deb\n Size/MD5: 6069522 51ab4ccd9b011259d5d1e38652e7b825\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-kernel-source_1.0.9631+2.6.20.6-17.31_amd64.deb\n Size/MD5: 1860088 159dc95ed774f2500e38614f09bf9df3\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-legacy-kernel-source_1.0.7184+2.6.20.6-17.31_amd64.deb\n Size/MD5: 1384748 40c8107290253b0eaa833e03c269dc26\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/avm-fritz-firmware-2.6.20-17_3.11+2.6.20.6-17.31_amd64.deb\n Size/MD5: 478354 adef863c988defae88838f04655fdfc1\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/fglrx-control_8.34.8+2.6.20.6-17.31_amd64.deb\n Size/MD5: 80422 6fc9d1603c409c335b2c2ba44f709ac0\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-generic_2.6.20.6-17.31_amd64.deb\n Size/MD5: 13537128 459552ec904aa5d19def26cc27f2f268\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-generic-di_2.6.20.6-17.31_amd64.udeb\n Size/MD5: 966300 fdb989c1ea5c525f5d19d428670270bb\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-generic-di_2.6.20.6-17.31_amd64.udeb\n Size/MD5: 1942518 37a0f6de40f21cceed0ed442ec0defe4\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-dev_1.0.9631+2.6.20.6-17.31_amd64.deb\n Size/MD5: 176226 342d5577d90cfaa204c7d6bbe4bde381\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new-dev_1.0.9755+2.6.20.6-17.31_amd64.deb\n Size/MD5: 176654 b33320a686ca2b8bf2726902decaa904\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new_1.0.9755+2.6.20.6-17.31_amd64.deb\n Size/MD5: 8682258 f78d47759f71aab0cc0cd34688c5be1f\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx_1.0.9631+2.6.20.6-17.31_amd64.deb\n Size/MD5: 7995534 20d837b318cf3fc366508de6def3f67d\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-new-kernel-source_1.0.9755+2.6.20.6-17.31_amd64.deb\n Size/MD5: 2525496 9a28bf56d5d594a60036aad4076a8fb1\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-player-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb\n Size/MD5: 1068838 daa14f0e96bc830293c8d33f8ce281d7\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-server-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb\n Size/MD5: 1630294 50e4ec261ba923c8141c1be34188b81e\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-tools-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb\n Size/MD5: 357824 db0e5a5d2b3168a63ac78661f0f26050\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx-dev_7.1.0-8.34.8+2.6.20.6-17.31_amd64.deb\n Size/MD5: 147092 cee36d8e57c8c4308764ccc0eb7f67fb\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx_7.1.0-8.34.8+2.6.20.6-17.31_amd64.deb\n Size/MD5: 9822876 d6f3a88b6185f9af8c4fc2c11383516c\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb\n Size/MD5: 23127496 7512c6818a2cfb363e6de96c7a0fd933\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb\n Size/MD5: 18482084 77c7bb1c7b37a9f180a67a3d4c4c615d\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-386_2.6.20-17.12_i386.deb\n Size/MD5: 86842 188cca44b7e7428066a02673f719eddb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-generic_2.6.20-17.12_i386.deb\n Size/MD5: 87360 e232efb909fa8c310f2c0d7b14ce15d1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server-bigiron_2.6.20-17.12_i386.deb\n Size/MD5: 87868 f40955e4ca733e6666184c3ca70055e1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server_2.6.20-17.12_i386.deb\n Size/MD5: 87818 2ca82b0ef30a59b7c44e7859e6391031\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-386-di_2.6.20-17.12_i386.udeb\n Size/MD5: 84182 5e576f3aea901f6140d308474a09c6a0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-generic-di_2.6.20-17.12_i386.udeb\n Size/MD5: 84886 38236107ff8f5fe920efc4c8279d1964\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 20326 9164e0834ec52ff52488e431cd540f3a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 22892 cb6a438e822597816ca22eba4d027117\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 210082 1114f0c2617cf8a7e7b12307cb7fdcda\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 212234 b4389be66b9a2de24aa47f1fca764075\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 88686 2b33f5bf88e9cbccdca938a41d024cf0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 35624 af9e722096a6e8bb396d9f5bdf2644c8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 37736 0a3798e29dc9017614910743ff71fe86\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 38408 019a0be0f53df06a8510084404e413cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 45640 764c449147614d444f5bd809cfe741c2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 45798 8451b700451bc4c3fb1fd436e8aff28e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 179460 3ee7930d30e01f2d7ac05fe0ad56d675\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 179826 6bbdde505787788aacad92568ca06b14\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 32100 3958d982992556c2eea54ac8b0aedf75\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 32432 369e2795e856b352702be2c90db9460d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 648592 fef7358c65f78d2f8796780cbec46730\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 667482 c36df77a008193efc98e7dcfe83cbb46\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 178208 5eb5a994fb3dc3d429e8e59dfc5ef870\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 181296 6deb4719a42de6f54f76b83bcec75f80\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 72396 bc422bb9a10152ab919a8d5232cd3646\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 74040 91fecfc61f8b9208abbc4b9542ac5751\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 53576 2f7e777ae61ffd13d738579fc2732d25\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 54782 f9cb368f9476cb00e5ea50e90fea9cf5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 129208 2561a2e204d0f0cf1be3fe933c583cd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 134862 38d76d10a700c21dac765cccb137416d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 275954 b6e9b4df7533754ccc73f4b74b629b34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 274956 94996c553bf55ea5457c588cb5a8d490\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1816146 cb9e49c3cf63514cf0e2c8566d34f355\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1886462 cdaa4d27814274989b6a5083e99d1468\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-386_2.6.20-17.36_i386.deb\n Size/MD5: 848474 cf3ef71c1ab7b2d98e4165c9c1f50b95\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-generic_2.6.20-17.36_i386.deb\n Size/MD5: 841798 11cc8e6ca8752a4b5aa003256653f673\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb\n Size/MD5: 848690 3849d43f5d59f12f9858efa36c2e63a7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb\n Size/MD5: 844936 b934d25879e62864a5472939edf41804\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server_2.6.20-17.36_i386.deb\n Size/MD5: 842824 a20ea95041deebdf0f3f78677962c120\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_i386.deb\n Size/MD5: 8120852 9cf19d50af64fa5402f5ee0b28f2d8b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-386_2.6.20-17.36_i386.deb\n Size/MD5: 23747822 05e00a5b92c8095dab78c1869f8c5b92\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-generic_2.6.20-17.36_i386.deb\n Size/MD5: 23815004 077ca83a6f88ed749e6f27614c1392a9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb\n Size/MD5: 24376484 2b4e84bee148e87c0eb01e032552d4eb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server_2.6.20-17.36_i386.deb\n Size/MD5: 23866964 2e4c61c3b57ed209bd4e2e6a81a5ae97\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-386_2.6.20-17.36_i386.deb\n Size/MD5: 23590486 b90067007b1c07dd79d7284497755547\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-generic_2.6.20-17.36_i386.deb\n Size/MD5: 24169290 94ce3aa4d7e7f240e9396b3833d797ed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb\n Size/MD5: 25665260 c8e1bd368b1da472152f9fdb024fffbf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server_2.6.20-17.36_i386.deb\n Size/MD5: 24395356 1291ec15c480d18c926af098dc86d78a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_i386.deb\n Size/MD5: 669136 984e8b38450985659cdde7c8078f62e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 244612 c9fe618b2c386c8a0e3b93c700f846d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 250160 d77ad34335e0332b8ae62f472d04319d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 132546 04cb386d3b29d3f85d97b08fff95c12b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 133070 753d1a7b4118661907b670cc93866118\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 213366 aabe85be12c68a079e03b8781567e506\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 220780 2e08b3d087dc753bae16ad4b9129f871\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1110422 393e5139ecad7796bc8b72ca03a29731\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1110530 c36dcc035ef324964739d43ed3730e94\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1951210 ceb7460c3af74d76337bd3eceafd18f7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1974680 62564aa09706a756d9061fc141b0379e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 149848 85c4f4be8856a6e29743e1a738d2f933\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 142494 1b4a54e2cd488b1533536e85c0b22d8a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 160754 761a44199326e79f428f93b9bf1de34b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 161952 df5dfac32aac66a50b8015b8bbef1d61\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 252928 9278357037422699cc8d417d831d9719\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 255510 188e6909c6f36c5e92ee0f780bde1367\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 32760 a02f028dd76e530920de4164aa1ef686\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 33328 511c6543e5aa044297a67b62c1c88fa3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 38018 82accd7c72f15c613cddfb318cddadcb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 38314 954c2e9d314276f13d499bff665bfde7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 81850 29805b33afc8664363d142368568df5d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 82108 96aee6a89a0b04ba3e3760db4ddac78e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 47686 6ba37e2bf10918c95db76ac2d417663e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 47708 2ccca5eb028aef1ac3f07078b654e967\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 8258 28b6853ce133922673a62d68359209d8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 8496 05daa9534a6d99cd44b17b62109eb39f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 49948 d5382680a57228bd677edfaece400b3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 51870 09303feef1283d5b2cc31040af2e5270\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 78846 438aaabd87a1ea789fc3be3e33ab8646\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 79490 b0a0f74d52305a342d3bcfb9504181ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 322546 26c7b5500cea5aa9f4e70f3da2f6fef0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 322570 0501a223e9a70712006f13d13431659a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1362474 f67e3a7dfaa82f5412792bfff3316500\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 1348042 fb9f6d6ccc587b2113876624bcfef226\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 42458 84eb68966a8c2dd68c2b4722efb34bde\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 42232 2c57cdc8bd71b4dce9f1cb1a7308bb52\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 10762 cead5edaa9fd8608035ea7c71cc7cc7c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 11400 93ec5d7e1628428ce1d4fabe4ebd49ee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 55992 4e5e603c5574b3b614b92a640d305c77\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 56890 fca150d57bce6f91574676ce771865ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 360300 bd62f504c6b28fab113f63a96a8fa2ba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 363212 524d7cfe4ae30d28eb3c2320dd64359c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb\n Size/MD5: 63168 450d97c982ac79e92a1bb2f4560be1ea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb\n Size/MD5: 63836 13f5e0b9090bd7b2866a46f978360142\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/avm-fritz-kernel-source_3.11+2.6.20.6-17.31_i386.deb\n Size/MD5: 3427088 a0644c93a95cbadc3e05a936d07866bf\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/fglrx-kernel-source_8.34.8+2.6.20.6-17.31_i386.deb\n Size/MD5: 217868 bb15afa23bee098b2c73ccabf16aeed0\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-lowlatency_2.6.20.6-17.31_i386.deb\n Size/MD5: 16103192 933fbffa39a9db8812c197356906e8ba\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy-dev_1.0.7184+2.6.20.6-17.31_i386.deb\n Size/MD5: 143102 9323142a37e668ee9f1201250f392f98\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy_1.0.7184+2.6.20.6-17.31_i386.deb\n Size/MD5: 3064282 0566dcf2de8751dee79339a5b7d86d90\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-kernel-source_1.0.9631+2.6.20.6-17.31_i386.deb\n Size/MD5: 1763250 0f0cb7cb6f68759e3052cdad1f1ca473\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-legacy-kernel-source_1.0.7184+2.6.20.6-17.31_i386.deb\n Size/MD5: 1376080 39281eee5e0b5d6ea831675349ee365f\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/avm-fritz-firmware-2.6.20-17_3.11+2.6.20.6-17.31_i386.deb\n Size/MD5: 1207908 b07a58f361554e355338ca08d44e8554\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/fglrx-control_8.34.8+2.6.20.6-17.31_i386.deb\n Size/MD5: 77680 b30bcb45b4d6f7421ef5fb757554d830\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-386_2.6.20.6-17.31_i386.deb\n Size/MD5: 16340226 0e7dd6aacb36a5601e80ba98555edc11\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-generic_2.6.20.6-17.31_i386.deb\n Size/MD5: 16096356 77590a41029409066d5093fcdf1127e9\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-386-di_2.6.20.6-17.31_i386.udeb\n Size/MD5: 966226 3a154fc15eecb9458f89939015ce51de\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-generic-di_2.6.20.6-17.31_i386.udeb\n Size/MD5: 966294 cb62f0ea1152f4c9c890b80e4427521e\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-386-di_2.6.20.6-17.31_i386.udeb\n Size/MD5: 2120570 11bc64fd197a751a742a6956ae0fd9a6\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-generic-di_2.6.20.6-17.31_i386.udeb\n Size/MD5: 2160580 6d566ca1acbd7fc9b5f795daeeaedd88\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-dev_1.0.9631+2.6.20.6-17.31_i386.deb\n Size/MD5: 156130 bd651a0a3892fdc3d5ff187cc0a45488\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new-dev_1.0.9755+2.6.20.6-17.31_i386.deb\n Size/MD5: 156600 5a124f9290921dac4d77a349b3ac070e\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new_1.0.9755+2.6.20.6-17.31_i386.deb\n Size/MD5: 4833270 1e6deb4cfbd5cbf29d8f79b0e597c454\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx_1.0.9631+2.6.20.6-17.31_i386.deb\n Size/MD5: 4492558 c56ab1045d05d8560a41a7b87e2a1c39\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-new-kernel-source_1.0.9755+2.6.20.6-17.31_i386.deb\n Size/MD5: 2454162 55179cc72ce26c101aedb84841e1eb08\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-player-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb\n Size/MD5: 1666848 ebb6fbab6e18332d046fa0d79abc9c0f\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-server-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb\n Size/MD5: 2860690 ae88be47f7596e2c8316f4e3a22377ec\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-tools-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb\n Size/MD5: 760492 a392956778451398b8da03b1c79bc051\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx-dev_7.1.0-8.34.8+2.6.20.6-17.31_i386.deb\n Size/MD5: 130326 755509fec142e17ce0dd45b9e929064c\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx_7.1.0-8.34.8+2.6.20.6-17.31_i386.deb\n Size/MD5: 6143092 6d6f3014f01f78b0dd8783366bc5563f\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb\n Size/MD5: 23844798 a165f36a05f57654361b4646218e9e9e\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb\n Size/MD5: 24183826 a75c933ed52aa1c39a22bec126889627\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc-smp_2.6.20-17.12_powerpc.deb\n Size/MD5: 93372 810566bb7bb90b911ee2dc796e8c6cfd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc64-smp_2.6.20-17.12_powerpc.deb\n Size/MD5: 118178 08fecf5875b7515466304a5e556d9c82\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc_2.6.20-17.12_powerpc.deb\n Size/MD5: 92842 4d4192118b9b0f015678bfcd21e6445c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-powerpc-di_2.6.20-17.12_powerpc.udeb\n Size/MD5: 95164 2c39459a0a423d23a74a52229d48d9cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.12_powerpc.udeb\n Size/MD5: 130572 82ae1b3368e8e7779670bd70196cde66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 328832 592f394abdc8a41de6f89a16aa8dceed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 325582 d502b2644f843efde702815b028c1618\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 41184 31ce69aa1a6c5a51fb21dd2546ddb7d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 47450 6fbc8b234f4b98e3f66d8ff4f187c74c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 219678 9516e67812981692229cc9aba7e9b155\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 239166 7f7662bb24b02f1a44f738354686ae93\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 43654 b44df31b967a80e31758c41e05ef2c09\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 39792 5cfed09a0fa48ce3838b2ba21ba4dad1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 717818 5375198b75e2a9a5d9f410af42d95524\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 776424 83319a673c7c9b10461de0aefd6e988b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 205086 aa0011d2dedf01aa32c1837777c7c2f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 209728 caee4552ea2b0b3d9e43b9610ca91adf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 59226 bd1604cf99df7ca4b0522ba0c1441452\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 66860 a47c0ac4b101a2b40bb2f311424d0515\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 64206 08027501addf0c66a9ea6cfb41227300\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 65330 5e617fdfc44c7335fc985e642d6c4130\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 144094 6ee22538b68ddda69ad8469d03cefec6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 162836 4258bd871f4baf4f81a1d5cc940058e4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 383348 0d6dd42f3a57d99915c48252c47c7c6d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 251812 b7f4e7cd8e7661da5f3c57d67d395420\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 2157764 98a7bbb74cc5e35b7bddc4d8fc12dd35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 3083674 83e44937cfeecffdef687e70f13b1093\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb\n Size/MD5: 864430 7bf3208e87d976b60431d01aa84703d2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb\n Size/MD5: 868770 0212168af66d47b1953bf59beb405822\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb\n Size/MD5: 862718 0edc424b8e413441e74362954ba58b09\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_powerpc.deb\n Size/MD5: 8151920 cc6e385dce05073af3df268acce45ebd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb\n Size/MD5: 24517498 cf103d3e1ed625118d0998b12bab86bb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb\n Size/MD5: 26861638 cbde33235ec6a7a6046ee860176b1593\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb\n Size/MD5: 24220490 e556a72ab4e97dfb786e72d740fa2f24\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb\n Size/MD5: 2128680 cfe9700869769c505d5b8d1d1c196e4b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb\n Size/MD5: 2855084 b3cc89ef46e5e4d06b2653172fe3b283\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb\n Size/MD5: 2050182 3bc2e7f25ebe8bea2839aebde16ffcd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_powerpc.deb\n Size/MD5: 645210 3c8a7642f76a3bab805c4deb34a7cac0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 253008 447d9c9761dfe18be30d647e1b96ba74\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 295072 a08094ed9b4cdb0b20b4ef07fe6a5496\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 155558 8c9bcba70f826b2c4fb871ebf3a12730\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 168430 19b9a0c1a718af5acaa1a97d28f23450\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 248328 7a33c002d5adebd73837fb91df317c41\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 280138 8d505bd1e195b9b165529180732ca1af\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 1110500 8f0022f1c5e95795aaaa1a07e814957c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 1110660 881fe6e0eaa3db15879e0e893684509d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 1951192 7e74e7050d2af4763c728f9e6f52b8d4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 2253422 13f6832a0289630d2e088812dbe1f8d6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 233498 0e5efa4dc2c1d60f2d63f736dcd3f720\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 223070 da1c37cf1a9665c274cdedb7d7d13dce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 172914 879737cfde3f122ef489bd0a34e8d1f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 205506 5b476284715dabe07a18acd0365b3f23\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 280976 1c05e11f0c7f33fa2ed6ed13650b396e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 316584 b4c7b3b1ec87ba54dddcc5d7ed85f148\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 44652 92750df6fd5855b3b84539e7ee40bad7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 43410 7de7ea097bbd5b0097c8a8dc21c362b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 41212 85c1a08a0dcc9cdc4999243b4607f277\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 53694 3a9e0e870d09ff29d98ea397eb9ca38f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 72814 f069b8db376da6ba6523c1f1a1744a05\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 85272 6dc2d289a49942a9beba89f338f11bca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 74542 64495f2bd744e1285c20f04aa7dc3a98\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 29722 26ac6df4a55fd8a7168ded5d445aa891\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 8396 a7dee9e87ee7e13108a2abf55958ee31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 9878 1c5f8521e8c11ec701f492a2b14d220f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 56170 927213142db35ecd6e22cb7b6c64314e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 67412 3eef4694fda05e830ac9b0d649879387\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 86632 244854a18a5ed03c371bb05b9f2142c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 129200 a76825598a96c16432ed54bbd9288f5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 322566 7f7779fa071fce5f29f59ce076e21853\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 322588 0cafc2b9ef45c349253c52e3de0c5c36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 1415810 bf842d6db566d7be83f36be0e045cdec\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 1345396 0463bf1a542fbf4ecf4ce2e4420a933c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 74242 2b6a9627312c1586aabdcdf4f7c8892b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 83244 6bac15c4400ddefb121c19b440bd30a4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 12020 430e6dd156acd4313105e5e8d808c0ee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 13940 2080831826d60e6e87672ddf66f0c6c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 78350 0b82c56c00c548e9a96c2ca73cec6f2b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 85460 4361070d89cfb39069ea8989da654076\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 398184 3a97b6bc7374983dfd5d99ba425886d8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 445198 85fe66984eccab5882988b168735b544\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 76712 6da01c2a1af08c51050eb89082bc244c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb\n Size/MD5: 100188 ba1822b9e7dacd482afa36a1a853db3e\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc-smp_2.6.20.6-17.31_powerpc.deb\n Size/MD5: 1295164 bfd9c631a8c1eaf0d77f960052c83dd4\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc64-smp_2.6.20.6-17.31_powerpc.deb\n Size/MD5: 998682 a82f0cb709d699144fecad690e04f602\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc_2.6.20.6-17.31_powerpc.deb\n Size/MD5: 1292544 1bd7e025d89460f69ad71fcbd8731781\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-powerpc-di_2.6.20.6-17.31_powerpc.udeb\n Size/MD5: 966288 8b862192df81aba11c1f6cfe2bd4eee1\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-powerpc-di_2.6.20.6-17.31_powerpc.udeb\n Size/MD5: 295204 df056e69d9aa45f76533009d499c6585\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-sparc64-smp_2.6.20-17.12_sparc.deb\n Size/MD5: 95642 6d7c17541cee91e8eb06912a9f20a396\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-sparc64_2.6.20-17.12_sparc.deb\n Size/MD5: 95344 8db377d069385f539a621e562b2df10b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-sparc64-di_2.6.20-17.12_sparc.udeb\n Size/MD5: 99130 2f245b90b8b087f61da2caf49f524fbe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 53734 0680b9f0398d7e48c53e7295c77cab8f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 42158 3da50612014614dac0ab87c946c65e6f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 211716 77368597943d10a9a5586f8a1ecc06db\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 607912 8da7a2b5371fb5f1a302a6e57e4ae95e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 142716 73f99532873b9c75317de0adb7471740\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 51444 f42e7104565f89629799aa413dca2b7b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 37414 12f0474f7342185f4d1b0b587c55f2f3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 151172 086fc37a2e1e76e3022f2254574affc8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 1933034 e1905a3433fad1d9462bea90cdc91535\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb\n Size/MD5: 780696 0ec6f4b5e642f0193e6c02ea4465008a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb\n Size/MD5: 776890 0e303a6399f5d569ee7984a2b010c500\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_sparc.deb\n Size/MD5: 8122866 d8d4552de1aa0078c02c0e428b6dd48a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb\n Size/MD5: 16953716 0b6bcacad41c64b40fa2d3b97557acf3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb\n Size/MD5: 16601038 9033c13349be02c8001f47d79888e214\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb\n Size/MD5: 2264344 ab3e7e36ec1257d862dd600eff70ccaf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb\n Size/MD5: 2178562 67786fc133bf741d728c88ba444d3537\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_sparc.deb\n Size/MD5: 700414 8b12ede19495f6b05c30288cfe31f866\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 264342 9906bcc6b5467bf2c1245eca6054eae5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 156570 4191f2a0d742efeccb67443b3945ff44\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 241232 e8523b32012e66d586f5df1cd381ea73\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 1110488 174c4c5a9e61867ad11e78dd808f9d42\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 1571838 e2e6a5ffe044c14520e27bcb5f5f47d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 180424 9ba8a77f742b1b835bb1c772ca962e21\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 310072 427ac0b7e51cb2ad23fe0ec83962cc5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 39666 f866b608114c567f28f9289a0d85c393\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 37984 aa56f559318f20f2e417026970a6bb56\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 8646 b4b5071fe7b4ab2e438d7901370dc94f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 59422 9d072776affde02fc4c1a90906ed2353\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 90818 1be13bc72f1ccc91803bba932730c25d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 322570 a483b9ea45cad7ab5c8029e96ea80d4d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 882448 7bb2910febf841cb05000dfd1de8a39f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 9822 b5066195c7efedec27f28e166ee4967f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 290142 732ddc7d6de7127a9b3163a76531473f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb\n Size/MD5: 54806 a249da34b1433114facbfda16afb0584\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-sparc64-smp_2.6.20.6-17.31_sparc.deb\n Size/MD5: 998636 e5e1018d1febb0a25443a1608d84d3d8\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-sparc64_2.6.20.6-17.31_sparc.deb\n Size/MD5: 998568 5dc6e3bd57278f3876e0ac6d1e5ac06a\n\nUpdated packages for Ubuntu 7.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22_2.6.22-15.16.dsc\n Size/MD5: 2124 215e3f71f504f09cb9d67ba3bce891c9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22_2.6.22-15.16.tar.gz\n Size/MD5: 3074102 dcede517498030950f00193fd7636cba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54.diff.gz\n Size/MD5: 3546714 bc3375a85185bb7c896f5373d04f927e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54.dsc\n Size/MD5: 2262 6d8aecb432a702d53ad5e15f9fce41d1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22.orig.tar.gz\n Size/MD5: 56913972 c98e1329975a8a7931ae63bafe39b63a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22_2.6.22-15.39.dsc\n Size/MD5: 2224 3fb717a6f4c6ca172730606024026677\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22_2.6.22-15.39.tar.gz\n Size/MD5: 6963922 51c929273ac6d58421cec603e65fdbc5\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4-15.11.diff.gz\n Size/MD5: 552663 40de07a2a55ec6e25250ef591fa1a70b\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4-15.11.dsc\n Size/MD5: 2735 6b99b949b4bdcac45c5ba49caf55d763\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4.orig.tar.gz\n Size/MD5: 143875748 ccbf90c68bf682e9df2371cd85c83c86\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-doc-2.6.22_2.6.22-15.54_all.deb\n Size/MD5: 4615002 41f0e4a86eb60e4f347677842fc1a7b8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15_2.6.22-15.54_all.deb\n Size/MD5: 7777268 5cce85c4b4a889d0cbc9a1b5abb3c9a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-kernel-devel_2.6.22-15.54_all.deb\n Size/MD5: 48284 20aff25c6f59f891366b96484814bf10\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54_all.deb\n Size/MD5: 45358212 f4fbc3ed3178453493924895e400b616\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-common_2.6.22.4-15.11_all.deb\n Size/MD5: 23372 1e08b20ca5d505d55d734e1e1aa7c212\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-generic_2.6.22-15.16_amd64.deb\n Size/MD5: 1181490 06a8c108ea3eb048aa7f7ade85b1ead6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-server_2.6.22-15.16_amd64.deb\n Size/MD5: 3758 62f7ea6c0cbb542ed06904426dfc097a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-generic-di_2.6.22-15.16_amd64.udeb\n Size/MD5: 646 5aed5ef44cf626f067fb5225ef8fccf1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 24800 531185f6ecc73aa2e5be4b792cc4498e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 216562 347e3fa6b1550d55c77537eeb557f89d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 49168 107ddc3f1c939471379d549fa2b0febf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 40034 d7b9a5d8878064b9aa69bcaad29267ae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 51758 fd8ed4458bef221560be980e99dd9578\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 87876 75cd9e963aa71a3765bb3316f72757b2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 35848 1328b905ca910427bdb7473f268bce86\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 652046 8edc4095a4e1af4691431bb8c46169dd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 205958 069e62303753e4b075d6143d019e1314\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 55596 409a1ea9cd365c2e54f3bd7dcad681c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 60512 d8cc2ae93537ec154afd9655aeba4cfd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 146252 b33b05e3b2f87bbf0fce5e0a969db483\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 285930 b020b5eec97f02b2b5a7f8cad963a878\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 1947322 62487759486e99cac46c84eb141dcf48\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-generic_2.6.22-15.54_amd64.deb\n Size/MD5: 593756 0cfa2f7530954f717b9bca97595e7ea2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-rt_2.6.22-15.54_amd64.deb\n Size/MD5: 1165316 0816ef9517f5e049c22437f89add88fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-server_2.6.22-15.54_amd64.deb\n Size/MD5: 593956 b508af1ec08db9b68fe53097acb42809\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-xen_2.6.22-15.54_amd64.deb\n Size/MD5: 949302 3c49468b650469542a3fc85c9a85d309\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-generic_2.6.22-15.54_amd64.deb\n Size/MD5: 17543644 7c467ec6abac34b98b6fc72a5b0a08e2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-server_2.6.22-15.54_amd64.deb\n Size/MD5: 17586456 947e9312ac817b9aaf36a0bae43af3a1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-generic_2.6.22-15.54_amd64.deb\n Size/MD5: 18740292 d8f5abc64c06e0d951f00295db516f7d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-server_2.6.22-15.54_amd64.deb\n Size/MD5: 19045588 2c29290b72f5dcf8cde1de91b6c8b061\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_amd64.deb\n Size/MD5: 653630 06c7f1cab32983620ce58fab3ed12288\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 252194 6490c4cf504d462e965ad16f9326a7e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 150734 52651e2b2ec7a9348bef67b3c8add406\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 236406 d03ab1e8dab84b9818448c6579286a25\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 1449288 149bbcbfb2f4801fd74e251c6dd68ebf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 142738 dbf111770227c3ed685c2a79d028e233\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 148666 f6b788f8348f92f08c5a81a66e7a02cc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 86010 52eca61e95705ecc9e1db45c37ef0d5e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 35446 8942a8ccbe1be9e71f07d109875771c0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 38396 f506ccb2cb0d35c0f36f676cec4ca394\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 70052 773f942a98207464ca5d62c6f955bc98\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 21462 acbac49df228ab72c5ea07d12865bea7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 8658 da2dac3d46f3ea80526ed9a29c83f56c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 56404 0d818ef611df79adaf83e383bcb93b3d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 88010 0de65f917fd1f6dc28018a910fe29fcc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 1101072 474a9588c6c099d13bdd5404860d3c47\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 45206 069e3168b034cd9756e1726e52f401d1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 12676 e66b970e6acd7e648a6dd8fa91711913\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 462914 b54bda2ce3b03da51c7b0a48b9a2635f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb\n Size/MD5: 71790 ac4a611b906456588036bcc639c354cc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-generic_2.6.22-15.39_amd64.deb\n Size/MD5: 3013948 86e7a6e87eddd16d2e9ce82e9ec269a1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-server_2.6.22-15.39_amd64.deb\n Size/MD5: 3012046 41d80f29a78860b4f323a669a1fb71b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb\n Size/MD5: 1048448 a5be33841544473a7cc80eb6cba14766\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb\n Size/MD5: 322530 6ec01c4069caf838edc3830ea5b92c85\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb\n Size/MD5: 477916 813f8a19f99dcefbe272b17561d22f50\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/avm-fritz-kernel-source_3.11+2.6.22.4-15.11_amd64.deb\n Size/MD5: 2134688 59b6823d1adf0dc7ff2dc0155ea21607\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/fglrx-kernel-source_8.37.6+2.6.22.4-15.11_amd64.deb\n Size/MD5: 191952 3b03fae1017d369824d7955ba655445c\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-rt_2.6.22.4-15.11_amd64.deb\n Size/MD5: 13660818 b3e3951e1a061dff40d3a05d997c30f1\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-xen_2.6.22.4-15.11_amd64.deb\n Size/MD5: 9854790 9938d8c957c31d19435a3f8158863f02\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy-dev_1.0.7185+2.6.22.4-15.11_amd64.deb\n Size/MD5: 169332 c6f2bf946b8030afe43d6cd74228151f\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy_1.0.7185+2.6.22.4-15.11_amd64.deb\n Size/MD5: 6070814 e857a22069a35ed93d2c5efeef1fa10e\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-kernel-source_1.0.9639+2.6.22.4-15.11_amd64.deb\n Size/MD5: 1862772 96fbbf557068a82ed152100ef0262672\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-legacy-kernel-source_1.0.7185+2.6.22.4-15.11_amd64.deb\n Size/MD5: 1390454 60065b0b590d25df1d6f9a0c0bc1377d\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/avm-fritz-firmware-2.6.22-15_3.11+2.6.22.4-15.11_amd64.deb\n Size/MD5: 479942 325f03b109f752ca8789d0c9e186e68c\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/fglrx-control_8.37.6+2.6.22.4-15.11_amd64.deb\n Size/MD5: 82088 41d91b8db807afe1807fbd68d7d31556\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-generic_2.6.22.4-15.11_amd64.deb\n Size/MD5: 13457086 a7c759a22c8004230c597d2337c56a71\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-generic-di_2.6.22.4-15.11_amd64.udeb\n Size/MD5: 766 ddf18ca1250601123959bdedc2d2c79b\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-generic-di_2.6.22.4-15.11_amd64.udeb\n Size/MD5: 734 753130cf45e4d916ce3792326662ed90\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-dev_1.0.9639+2.6.22.4-15.11_amd64.deb\n Size/MD5: 178324 763f49138f65bcd25344b3165caf624d\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new-dev_100.14.19+2.6.22.4-15.11_amd64.deb\n Size/MD5: 158248 da89d68c5bf9bd4a953699b0a7a677c5\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new_100.14.19+2.6.22.4-15.11_amd64.deb\n Size/MD5: 8890896 044fcbd4369090fb6ddfef265c68eda0\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx_1.0.9639+2.6.22.4-15.11_amd64.deb\n Size/MD5: 7996392 f71195542bcffbd3c5617cd04976dcff\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-new-kernel-source_100.14.19+2.6.22.4-15.11_amd64.deb\n Size/MD5: 2279348 cbea5190dcb7ebae1c6cae41f812d43c\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx-dev_7.1.0-8.37.6+2.6.22.4-15.11_amd64.deb\n Size/MD5: 67596 6c459900b9d5f076f8db357dd024b33d\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx_7.1.0-8.37.6+2.6.22.4-15.11_amd64.deb\n Size/MD5: 12254418 cfd39f34d91e4a48573ded79c6215427\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-rt_2.6.22-15.16_amd64.deb\n Size/MD5: 3754 81ca2ccde6e44e42d0acb8b6f4f8d766\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-xen_2.6.22-15.16_amd64.deb\n Size/MD5: 3782 76929d77a0fbbb99e401a179efe3d40c\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-rt_2.6.22-15.54_amd64.deb\n Size/MD5: 17592292 0cdb657d868402a744dd67acbd9c7b46\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-xen_2.6.22-15.54_amd64.deb\n Size/MD5: 17355358 5cf6d90812d22fe685c4930f6ab5b99a\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-rt_2.6.22-15.39_amd64.deb\n Size/MD5: 3017126 58a8de462a320964eb37d4713ef063e9\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-xen_2.6.22-15.39_amd64.deb\n Size/MD5: 3013834 3b2735bb3fe07a149a0c6d7216c3e08d\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-386_2.6.22-15.16_i386.deb\n Size/MD5: 3756 38e40f57e2213ec44de12fd1586c9a28\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-generic_2.6.22-15.16_i386.deb\n Size/MD5: 1379014 512338d9fa1b651ecbc39b1db0285688\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-server_2.6.22-15.16_i386.deb\n Size/MD5: 3768 4c0ab45a0ba5dc56a9006e0797ac8a7f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-386-di_2.6.22-15.16_i386.udeb\n Size/MD5: 644 5f31cf301f6b8971e7e8733e85c212db\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-generic-di_2.6.22-15.16_i386.udeb\n Size/MD5: 644 df4807c07fdd185f50ef8dc3743bc4bb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 20418 0f9de8a6295d16cae1fe7b9d25f4c822\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 23228 5e895d82dd9023b629fef23526464f91\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 211438 5e635a70e6b1d97021164f5a6bd11d51\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 213080 df89aaa52d9017a795bf22dec05ec035\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cdrom-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 89010 2e70caf2aa5cefb7070ec8668212188c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cdrom-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 35754 d7642234f8bd7dea30b36dea8816b934\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 50008 21d399d289ffc1c0a787d6d1814ac7fe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 50140 127fa8d9247590932c3bec3d2fba5029\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 37956 3d389edb98991e385f671f0d44178d53\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 38610 f07c2e59ed2764026399ebc28685a107\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 44950 3e9f0f01a37259c48855afbfc5043f26\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 45204 60ed4bebdd8f793b28687067956b6460\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 85328 a1340f905e08fabee46c8c643fdaa5f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 85656 ca69911c4bdab605ba471592f9b22d24\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 32344 0f9de7030cccebbb73316b74ee81d04d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 32646 201910ec059ef8901a70fc6748648b90\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 640694 5c2e673d57c1a9aecea86edc15a08664\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 659482 c805fd12258be8e0f94c43b9dc5017b0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 206054 6b84aacb3a21d7c5ecca022fec9b7758\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 209784 ba33674cfcea7eabc5d3365a4725472c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 52652 b81d9b2a4d891f5176ff23e03c931ac4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 53866 089d7bcd4eecff3ae3cdfa3dae74988e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 55524 cbddfa0961691f5af1e5078f1fbc6341\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 56914 4975e2e7e8a9cf550c7b763390de6353\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 130910 a56c5b5ef04d03fc9d7abe4dd9ad1dd8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 137790 2d9998c3221d20bab47ef3c3c885ca36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 277866 52a5a0032d93c63d390bde041de9e987\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 276378 364eef19bd824a34498065e9bc011a98\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 1834666 4d1004a88c1f30305467a1151b05caff\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 1905930 521d19edf828d41bda242061f580f39c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-386_2.6.22-15.54_i386.deb\n Size/MD5: 579506 e31e25124b45afdea454fa2e5df96981\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-generic_2.6.22-15.54_i386.deb\n Size/MD5: 581308 5978bd43dba625bcc0d90d78ea7976f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-rt_2.6.22-15.54_i386.deb\n Size/MD5: 1154954 331ef788b8936ca09297278c54fe0a73\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-server_2.6.22-15.54_i386.deb\n Size/MD5: 581292 d13dfb1538bbeb0406869f9988e63966\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-ume_2.6.22-15.54_i386.deb\n Size/MD5: 527716 38db2de69c705b3848b362d6285a78cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-virtual_2.6.22-15.54_i386.deb\n Size/MD5: 466996 581eb343942f0753c7021374cf203dd7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-xen_2.6.22-15.54_i386.deb\n Size/MD5: 923522 de45312cd1e8ef642be2a1e321719a73\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-386_2.6.22-15.54_i386.deb\n Size/MD5: 18568374 73fa4b00dea5d4ed59a1bf81b9e7f70c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-generic_2.6.22-15.54_i386.deb\n Size/MD5: 18542298 6ed41de04e6b219e5b45a7de205cfe96\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-server_2.6.22-15.54_i386.deb\n Size/MD5: 18630526 c0b10915988e225c3978d51a7f94ee71\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-virtual_2.6.22-15.54_i386.deb\n Size/MD5: 6704572 fddd05f27808e8e114d958ec6cbe7928\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-386_2.6.22-15.54_i386.deb\n Size/MD5: 23478456 6271a25d209b9092e6e266e0d2760c4a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-generic_2.6.22-15.54_i386.deb\n Size/MD5: 24123012 c4ae07814e5cb34954bcf9af2d065b8f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-server_2.6.22-15.54_i386.deb\n Size/MD5: 24388984 8ec3bfe06020cde3427e0a223b5229c6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-virtual_2.6.22-15.54_i386.deb\n Size/MD5: 22814866 a6717fed353a6c8db978f2bdaa87dab3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_i386.deb\n Size/MD5: 653638 28d2e17c8dd12239709f7d26dfe847d6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 247896 d1913a5288822f9a4c5d8252de2380b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 254864 05670a61ba685422884b35b4b36a849d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 137044 653ab55a5d2fac7514dcfa427a729de4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 137394 5ef931689ae1d45255c7be7042291088\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 221114 e363197d0c5452adfbe718d129b56eb1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 228418 689a74ed0f50826efc882955901d8661\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 1627050 4fc2c87e20fc465fe8819c5835a9bb4b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 1647312 adf8ab86dfd814c0753ca926609a0f28\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 150434 e24b4ec46d62dc664d08bdffa2184239\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 142510 c41820cbdb83d7661351e2d6ab6759c3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 141124 f2890109982c84417b97e4f9b0ec47e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 142488 b307586a011a4b90aacb9d7c0ea7832f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 79274 95f09af1d5d8d44641d95b99f664d743\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 80914 7b3af901119a8f441ce29a39390a0585\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 33340 7f3b5c8fa51fa3511dfbd49d50d86b8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 33872 441b2e45c5ecec67c362122134e19040\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 37978 31e7de73aa0a902ed47777522cee9688\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 38250 653c0b1df6df39d123596f3cdfccff1a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 83258 6dfb13d2cd4481fb354d29b43f1a34d2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 83440 b945199f9b0e767a04e752f7e9a4289e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 48210 7826c79ecf33f121e5f2df228ba901bb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 48188 f4694ad1e5f586f83dd577e4c13ee041\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 8188 2e0ad32b18f1bac73aef856de27399dc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 8410 46d5527c5e1c951dd7cf20cfebd00285\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 50454 a2dda1b9a98c02c0f4dfcf14f7352f64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 52362 17070ff42e9fd0daa887ad2bee2584fe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 79486 39c05ac72f00b488c2e4657922fd845a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 79792 f9d1fd2ee477806b6f5f8c6eac8fc433\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 1388110 3d00dfd9e297f0f5c13cb6c216257fbd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 1367550 c167a877b6a66d820c462e1a42c464df\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 43022 ee80c18e4c855f38b300b3298bcac9cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 42490 6e38df6c8dd793414db655b4df862b89\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 11274 457f9450561026c51e7dce62b99492a2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 11860 a005b1cdbcaf9916c60144b96a068a3b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 435680 c410f7c8d57506611fb299d6219b193a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 438856 8442dc0500a51949003790c676c9e6e1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb\n Size/MD5: 65898 3518afe7357301623e77d92f29ef7cd1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb\n Size/MD5: 66818 b3eee8a3a0e5de1b73abad161b92977a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-386_2.6.22-15.39_i386.deb\n Size/MD5: 3043288 ccb4308e0bc160c24707f5854eb2e412\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-generic_2.6.22-15.39_i386.deb\n Size/MD5: 3054328 2d56c435cd060b2745a0ca6206366bb9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-server_2.6.22-15.39_i386.deb\n Size/MD5: 3056128 04a9e15849ffb6ae029d63ebb323a1c0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-virtual_2.6.22-15.39_i386.deb\n Size/MD5: 1551418 650f8adbb27269b364282c89c0b24c23\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-386-di_2.6.22-15.39_i386.udeb\n Size/MD5: 1048342 919b46aecdba9098a5ae27b479cc1f4f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb\n Size/MD5: 1048442 931c9093fdc92d6f6634202320559901\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-386-di_2.6.22-15.39_i386.udeb\n Size/MD5: 322512 e639c5c2c3439f93a2ae0c37ea28c7b8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb\n Size/MD5: 322534 934ae69176bb17670c6f081a1b1a4979\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-386-di_2.6.22-15.39_i386.udeb\n Size/MD5: 453408 77a229a8e4d2f83fd56740ac24e655c6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb\n Size/MD5: 453002 ab5b8dae55c15f59956c339c2017f3dc\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/avm-fritz-kernel-source_3.11+2.6.22.4-15.11_i386.deb\n Size/MD5: 4084628 5c38b21f36b5d04056d0ee3d683630d2\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/fglrx-kernel-source_8.37.6+2.6.22.4-15.11_i386.deb\n Size/MD5: 191960 162aecb99815f6b9a339b1299e2973c7\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-rt_2.6.22.4-15.11_i386.deb\n Size/MD5: 16791012 ad32c528dee8398448700bc5c132576f\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-xen_2.6.22.4-15.11_i386.deb\n Size/MD5: 12658912 4ed7f2b8ecfb4ce974648c7bc8b2c7aa\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy-dev_1.0.7185+2.6.22.4-15.11_i386.deb\n Size/MD5: 148548 b712289da5c1c90c3504c49c066ab579\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy_1.0.7185+2.6.22.4-15.11_i386.deb\n Size/MD5: 3065766 ec9626779a8a817c329bb84bfcfa5a9c\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-kernel-source_1.0.9639+2.6.22.4-15.11_i386.deb\n Size/MD5: 1764500 9aa631e66d1c4cf18369b10ff8361539\n http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-legacy-kernel-source_1.0.7185+2.6.22.4-15.11_i386.deb\n Size/MD5: 1378112 b2cad4be9641a5ffd6cdf959b9971898\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/avm-fritz-firmware-2.6.22-15_3.11+2.6.22.4-15.11_i386.deb\n Size/MD5: 1209490 042181978d41e4e68fd55c90564822ec\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/fglrx-control_8.37.6+2.6.22.4-15.11_i386.deb\n Size/MD5: 79368 fe206f7ee03e52a803275d72446ecd1d\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-386_2.6.22.4-15.11_i386.deb\n Size/MD5: 16742196 585c649b0be6bfe04c1b07a5a65b86b8\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-generic_2.6.22.4-15.11_i386.deb\n Size/MD5: 16533700 efb709c3e9b7d468eb8eb19cd4bd24c1\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-386-di_2.6.22.4-15.11_i386.udeb\n Size/MD5: 764 812cbf6f07ef3f8e82a9740b9d8f4833\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-generic-di_2.6.22.4-15.11_i386.udeb\n Size/MD5: 766 df205d71cd5d3b82fe07e703042aa7f4\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-386-di_2.6.22.4-15.11_i386.udeb\n Size/MD5: 732 4283d253d3cedde341a7a75d530af147\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-generic-di_2.6.22.4-15.11_i386.udeb\n Size/MD5: 734 856c774ebdbe8ec4acc0e1a6a9130669\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-dev_1.0.9639+2.6.22.4-15.11_i386.deb\n Size/MD5: 158286 c3037f07e6753221e09ffe4afa5cb17a\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new-dev_100.14.19+2.6.22.4-15.11_i386.deb\n Size/MD5: 146010 ad9c127bef125b66085db9c7bb0bb547\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new_100.14.19+2.6.22.4-15.11_i386.deb\n Size/MD5: 5013914 7a529396a64deb58e8e5beea3941b5b9\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx_1.0.9639+2.6.22.4-15.11_i386.deb\n Size/MD5: 4493322 db303977d7fc8fd18a6e2d4eb6c75881\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-new-kernel-source_100.14.19+2.6.22.4-15.11_i386.deb\n Size/MD5: 2253080 b9d0c5159b5973755f853087980c37a4\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx-dev_7.1.0-8.37.6+2.6.22.4-15.11_i386.deb\n Size/MD5: 67078 c38c30bc72618a411b2b40a07575c3e4\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx_7.1.0-8.37.6+2.6.22.4-15.11_i386.deb\n Size/MD5: 8558012 826ec61e79243432e14df3c4fe01c482\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-rt_2.6.22-15.16_i386.deb\n Size/MD5: 1379430 890e80ab2cb552da35613c66accdff3d\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-ume_2.6.22-15.16_i386.deb\n Size/MD5: 3734 395b2624c54f03633eb87f0cbc97a4ae\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-xen_2.6.22-15.16_i386.deb\n Size/MD5: 3770 56a1c5dfbd6840d5bb6dc589e50e59fe\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-rt_2.6.22-15.54_i386.deb\n Size/MD5: 18593802 a23697c081e4de446386196207ba172d\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-ume_2.6.22-15.54_i386.deb\n Size/MD5: 8651184 5485ade0608249b603b2d29f52796a60\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-xen_2.6.22-15.54_i386.deb\n Size/MD5: 17337476 f7c0dc20dd33587cb7170cf9b0547399\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-rt_2.6.22-15.39_i386.deb\n Size/MD5: 3067524 cd3cb7109cbbd0276ee4193b47bb925f\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-ume_2.6.22-15.39_i386.deb\n Size/MD5: 3049602 578b1c56c65249fd8f2a45c1f35193ff\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-xen_2.6.22-15.39_i386.deb\n Size/MD5: 3058274 c933d038855ffac90f36a2f4c4db42fb\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 31564 6ee7cad81861752974ccab8913be4923\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 174622 a7075817c8becfc18ecc3c3909a9bb80\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 47544 b88af59e21f122d1eff2dcd287727ba6\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 34816 850e9452d08f4cbb8b64a51d6ce8dc1a\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 25670 18b1cfc1c9c9b017da1cb5742fc62fdf\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 78152 7f6682322618840f38766edc66b861ef\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 29642 b48d5450abf39b2768d684c240b38b85\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 123420 4def6fc4ff8e55b307db81e27fb762f5\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 68574 e17c91ebd8e489f5a4ca4426925a0aee\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 1394 d2263d8cc68c8150124ca32cbb6ceaa0\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 50900 f37be62f538f6c92ba9179f36435ef16\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 123346 a1622a607060d17717762687be2f1585\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 246236 f729caa2c10a68e4ca7b2c2c4282c99d\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 1534938 f3736b30f419b2cb39c586f58e80404f\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-lpia_2.6.22-15.54_lpia.deb\n Size/MD5: 581738 74e64d51193e30694c2a80acdb4a9126\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-lpiacompat_2.6.22-15.54_lpia.deb\n Size/MD5: 595466 b51b81f74f87ea19594b4bafe7cc1c9e\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-lpia_2.6.22-15.54_lpia.deb\n Size/MD5: 8328860 dd4ef30b143963c15af5cddef259e122\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_lpia.deb\n Size/MD5: 625872 496035aabc97f4a9baddf755c4f30eff\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 46924 a532ca40697d5ca69025f1f681987e0b\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 206940 8c33ba7be35ad9051ca16c96895f412c\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 234188 fe8de6cd05a99936cd729308599a3d53\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 124156 6fe418390d62c87d4bd031f3b27e4f8b\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 40326 c182a285e55e30dd4fd9f504a0be6550\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 30656 80a9a3217417ce60c11568d75a9be23a\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 3666 11c3107c1f5a702d27fe2d29e5395deb\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 47230 9894aa9fbc062ca1ced5d3b0949ee1cf\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 15768 c1ac8d8e1979307c2d1e0ef9da348072\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 96662 c44a69eba22367197430d54acaa99580\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 10878 f831fc959d85f492e23caf138fba832f\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 377552 a90580eb48e723f72335402d6e85d7ed\n http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb\n Size/MD5: 52864 e6f4c21bece42c5ffff4204b818f39cf\n http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-lpia_2.6.22.4-15.11_lpia.deb\n Size/MD5: 2898792 c9bd2701af313e7910619956ff90964b\n http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-lpiacompat_2.6.22.4-15.11_lpia.deb\n Size/MD5: 3120354 faad74cdcdd2472127ab808a1c052d10\n http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-lpia_2.6.22-15.16_lpia.deb\n Size/MD5: 3746 6a5675f03ca203a51233307ec24ee001\n http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-lpiacompat_2.6.22-15.16_lpia.deb\n Size/MD5: 3772 c6ca093178a288087d42ccac5685182a\n http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-lpia-di_2.6.22-15.16_lpia.udeb\n Size/MD5: 644 1496fbb995b406bd9cdc2c86c80ea312\n http://ports.ubuntu.com/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-lpiacompat_2.6.22-15.54_lpia.deb\n Size/MD5: 18529856 30bada6dc184ab15505d0e4574716595\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc-smp_2.6.22-15.16_powerpc.deb\n Size/MD5: 3776 a865c756c85227c4b4c99bcdd3527da4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc64-smp_2.6.22-15.16_powerpc.deb\n Size/MD5: 3802 aa1096bc346f2f035c958d334b62a6ae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc_2.6.22-15.16_powerpc.deb\n Size/MD5: 3774 8588158f9ddfb583ab42815497394f5d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-powerpc-di_2.6.22-15.16_powerpc.udeb\n Size/MD5: 646 19c2d7fee87ceacc358002a4e1a67367\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.16_powerpc.udeb\n Size/MD5: 648 7ef35ae416bf2f80db27596032363462\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 315160 76de8fb0030716726ac881afdf912262\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 331806 945326f8e67dbe67dffca506fe70b68a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 310634 7d32348468e25b6e8161eb1e794dbbc3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 69108 9c0cc6d763c9a26965d95b1016f23366\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 59600 e8ad3dc8e454774b4b48e4d86903b3c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 69124 a9694608ebda5380e1f31c6c6d48a71f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 47626 d4a71e109ab995054184e3880c5f85de\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 41296 3dc951a9e00d2992573df883125c9673\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 47628 ac297004e60d6daac2c5077b4f597af8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 107324 0af8c2548273b734d8d423b27943f1d6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 91162 b7cf64c5781cf1680f0b43984dbb8e8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 107284 da3d9f2d058a9dd6d41a56fed7e5a166\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 40968 498b97586b06155aab845e21b15c6ffc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 44734 93c489df9c18963cfef25f8d848fd702\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 40978 93a3f89c4bae49dbab525f2244ed90f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 773510 5e3337dc062ce47a23744bab9630dd97\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 709242 e9365b33f36e855d6cfd841d97214e52\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 773420 6faf03e36789cc6bc1aa3296a7d4e07c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 243332 f842b8f9ba469616ea848991916f030a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 236400 b02a1eeca0b26e053f752da0d4541996\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 243298 ddf59a7f8b7e1abb0c16d50e5f7f3c5b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 53772 8d4cdc627ad212f655fa4771909a2631\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 47384 fca7ed43dba57b56d77c0afb5bc36fed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 53740 8aacab34266a00ac6b864e380f498d23\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 69044 199cb6c932b1c57896e1765bbe4da986\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 62400 a01800fc7c294dd53eaf87f43fbe2330\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 68996 d07d16dc42d5daec47b8f364389d7433\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 166820 95db10ab499ab76aa49ca336ce6c17ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 147482 5d5b81ecf9970e96b48be6eefc8122fa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 166684 ca4a1e06d95a88309fdb93d948b05ae8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 347892 f845d2b1036cf7d96aa1ccc277a7b2ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 385002 bcfa8c06cca8efca21d1661c91890e07\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 347782 d2acb9f168d9403a7f1d6beb3edf80d0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 3204126 e0449de12be613e0ef6f71b33948a26f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 2182774 6b34a7331f66cc6360ee518134b31a9e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 3121074 94b278820db5d9364f3a11332c4bf6f7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-cell_2.6.22-15.54_powerpc.deb\n Size/MD5: 658542 224b256989d50b0babe3e046a8a5acd1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc-smp_2.6.22-15.54_powerpc.deb\n Size/MD5: 568724 14f0c68ecb1ea96fd589bdf0050c22f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc64-smp_2.6.22-15.54_powerpc.deb\n Size/MD5: 572426 1f588c7a9f543e235d4c985a13732fe3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc_2.6.22-15.54_powerpc.deb\n Size/MD5: 568282 ed5c8079a439162c175eca4913cb2dd0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-cell_2.6.22-15.54_powerpc.deb\n Size/MD5: 19766842 f303b6b54e23c220d5cfbeac66d4faaf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc-smp_2.6.22-15.54_powerpc.deb\n Size/MD5: 18708820 3bdb75aaaa8961d3f3730976403cb8e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc64-smp_2.6.22-15.54_powerpc.deb\n Size/MD5: 19744780 b9a76ee8362bc970adc9868bcb9b4309\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc_2.6.22-15.54_powerpc.deb\n Size/MD5: 18485548 1b1fd19601cb719bf42fc78ceefcb444\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_powerpc.deb\n Size/MD5: 629682 790e46628648d1b59b4796a607920d47\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 298656 ae2aae1d23ee9459c3a2c238f62b0c3f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 256442 6b9c9cf85cbf6caf9a904172ab8353bf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 298538 e2e158aa1390c6650dc31f8bc6b666da\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 173322 46bc77ff2c7dfe168a99431aed9543fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 159610 e2562a075799cfd2d38ce8cc4f5b10bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 173266 95e55b6c7f32762abb49f3503aca44ec\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 288574 86783294fef9eaecaf0fea407e01378b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 256444 28dcf9ad4907afc1db0cd6ea2da52ce5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 288540 1502f113e0c9f40f3d8a8629467f921a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 1931854 18199bd1925f2e7f7188ee3826dad7d3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 1654766 5813c15c304f8e11e7202867d43192b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 1909850 62c123566de18c9a33a1e06ede984735\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 216076 0b3682996152ba06ac5fd6373aa6d735\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 234448 3531ee385f9be4c3616294f69a7bb210\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 224102 f59d04573e8556fd788db3da5fb78a15\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 181652 31e05543b341fa1fd3a2afc1d83fd1cf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 153868 7f32b2cb52a3ce4ae228efd44597d130\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 181584 c6b132d7e6f8b4dd0bbeccdc03447a6b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 103632 6645c56a57d8b9b5772c8d375b8e6bcd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 86736 3b0b2786ca7aae2e78027ab51eac2be6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 103494 c569c090e64b3ca81508d060826925c8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 46978 7e539f3deae48b9bb62b10f8cfba97ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 45402 628c4a5fe3245fcb4cb5c4dfe12a2bdc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 46996 da7e8a7ffdec8578333b4945278bad90\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 54468 9e847dace1f6bb96dd4b2a4a68f0a7bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 41570 6a7226a7fb2a98add60fcabfc5dd65ed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 47806 2ef913db23ed334fe01c3000f1d3823c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 87004 431473bc1306e9abadea45405d748f8f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 74054 83b8bc0d89a70f616e47bebd2d4ae188\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 86976 ebe28671e620e988936babd9dcaac03a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 30306 444a504fbe3a928fcf975c1c4de6911f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 76260 bcd35555297c4707bfe4998c78cf1aa9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 30332 0ba859f43a4526a51a02dc97e15845c6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 9952 8f8a952c62200febb47630546ea2f7b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 8458 44b8f28b718470b9a0f6544edf6e7d78\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 9948 9be31362b48f63df01f9eb3bae241200\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 68476 5dfcb2d47d20f04ab2fd730cd00d0e92\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 56868 43a9199173d14b60514cce4e26c04e0d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 68450 4d37835af2ccd7767f65bf5b862182f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 131418 2bbffb08183ef9737b1c7ee7d91c860f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 87806 d1f7fb7a127c3bb5ea17a71f1d47d26b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 131240 f3472f484e00531c8d606deb7dedfe65\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 1432182 11115ebffcd3b842dbbc68f5a3f62b3c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 1441334 73962d3133f94fb2b761326db53c2167\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 1432046 5f35cce2c671c79e10b8cd43bea84d4b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 70948 2d8686184d04697c8be62752cae815ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 75508 d9105ae8e009613e616147e76f780b0a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 84768 fd7f0edf50e458f429f1e87f3055f3ff\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 14532 9a3539e3c59fb397abfc9508f5c9578a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 12536 9c5146c46602c9ead4d328871d3f17af\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 14528 73f06b41f5764ed81468e4d89e97dc0c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 558348 5b80e2fb36c8ff6a55f896a5fb7e2e3d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 492732 29b5a718362fe422c612f72c4da114a0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 549300 4dec89e60b7d7b5060c0cc8455c2c9ac\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 105380 ccfd8dc7b67ffe3abde899289adfc200\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 79662 1b4022ffa935534a726498fce40b4eda\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb\n Size/MD5: 104304 02c6251885f3f373d18446b958c2855f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-cell_2.6.22-15.39_powerpc.deb\n Size/MD5: 2619590 af8281593571ced37b2129ed2342fccd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc-smp_2.6.22-15.39_powerpc.deb\n Size/MD5: 2567378 20bf3027940d1142ad8803732870f36e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc64-smp_2.6.22-15.39_powerpc.deb\n Size/MD5: 2620222 8073e56c511e70257e61599e18b5bd5e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc_2.6.22-15.39_powerpc.deb\n Size/MD5: 2554464 27d7b5e667ec571d53285d4cbac8f203\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 1048390 d4b1ca0b0ab22138ba04d681dc20f0c3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 1048432 e45f37ec5193154aa04c35fed50fdaee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 1048558 0c6648aa9377a3ccc64477bf5dd08f38\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 322524 0fdea901bdf7b9173d89d49f10648d0f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 322536 5a36968fa11e67940cf88dfec8f5b90a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 322560 63ec46beb37b44f7e901d4a17d4d5002\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 267156 690a55e73215d9bc450caa6b99fc4476\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 220186 7710f01beebe09e0c9bf2cb812991139\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb\n Size/MD5: 267210 651e58dc6fce70139c603386c92ff3bb\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc-smp_2.6.22.4-15.11_powerpc.deb\n Size/MD5: 1300508 45e687319d4e0d2dac393138e6f2d6c6\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc64-smp_2.6.22.4-15.11_powerpc.deb\n Size/MD5: 1002304 9f77a9427eeaea48276c6b68547d824f\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc_2.6.22.4-15.11_powerpc.deb\n Size/MD5: 1298454 fc0dcab1f9958209c7f4266bc08de844\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-powerpc-di_2.6.22.4-15.11_powerpc.udeb\n Size/MD5: 764 d6233f778dcf936a4a0478aa80409d52\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-powerpc-di_2.6.22.4-15.11_powerpc.udeb\n Size/MD5: 734 8505f5c770efe7e12619fc324996c31a\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-sparc64-smp_2.6.22-15.16_sparc.deb\n Size/MD5: 3802 e09e7173876354b9a1bb6846e9437b67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-sparc64_2.6.22-15.16_sparc.deb\n Size/MD5: 3772 586b2c371ca1f45ea3513cfa459fa08a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-sparc64-di_2.6.22-15.16_sparc.udeb\n Size/MD5: 646 049e8815ed4659bbd756521f44d1b957\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 59312 4c07f24b58ed97db0fb543db5a8d4856\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 68268 a62b0e675c367386a3208a198f127949\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 42130 4b939c9f08fee124425bd784f7bf7d3a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 95330 eb40ad8d594615e788ecf89c529c1561\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 594048 cd592a5479c6d7119a2eabe234aba28c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 169390 703d55b772601b01ef874202350a9549\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 38254 691b333634c543721644e9126fb6f22e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 38648 3c0eca639d2d669846051bc7b3acc3db\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 154606 57fb00f92f0dcc365e0c41540b5efc41\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 1993026 46125df549b3d01d4d8cc9b4356e9fb1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-sparc64-smp_2.6.22-15.54_sparc.deb\n Size/MD5: 475654 c92a5bb9e70c8af93c8ba14d222d2b54\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-sparc64_2.6.22-15.54_sparc.deb\n Size/MD5: 474486 2c0f22707763247036f715195ea32cb2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-sparc64-smp_2.6.22-15.54_sparc.deb\n Size/MD5: 12415598 f88ba6815bda87f9f6bab3b1f08f2c02\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-sparc64_2.6.22-15.54_sparc.deb\n Size/MD5: 12179794 406b603b04315995ed3b535149d11ae2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_sparc.deb\n Size/MD5: 684538 d20de9a13d35cd857709d8e97110d89a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 265810 e454ac8cfbb55798d897f6b8f915aaec\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 159904 f25815be23aae799ff31fb30b0f660ee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 247460 576ba769410c3856461f98143f89064a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 1254066 0ae70dfca4fac5dc7187d025654c811c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 159996 f945e232f58c9a3c54ee4dc317c24005\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 91978 762357557c147272e8227fb1394886f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 40636 bc40eb4e9aaa6c4a798f93a58e4ea196\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 38574 da8bb028537d9379b91be3524de7cfdc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 8646 ecd7b4d5a5cd5ab219902b3cf2f87227\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 60070 4adf7e7028b4fe0cef8a3f463b8c6ba4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 90990 a46723f940c9b17edd69478fba14a9ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 875908 833753a21da42ec786aaf013767c85e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 9762 fa7c339472c4bdfda8b82021c0c45dbf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 369314 55df073f08fb5e80aa5f7211d3585417\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb\n Size/MD5: 56888 eb89eaebdec3149988ab5fd1652a116c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-sparc64-smp_2.6.22-15.39_sparc.deb\n Size/MD5: 2578980 89f82b147630b1a42234d7a7f428905f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-sparc64_2.6.22-15.39_sparc.deb\n Size/MD5: 2568738 a4a1af735ea7160b6f47ef0c749689a1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb\n Size/MD5: 1048456 ee8f6d236b1ab8877f7fe255c748c082\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb\n Size/MD5: 322536 7891ae3bb1a75ad4a68f895e3d8632d0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb\n Size/MD5: 227024 7a30e435d568400043ce19e83390e38b\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-sparc64-smp_2.6.22.4-15.11_sparc.deb\n Size/MD5: 1002242 96e1f749c39577efa970f85dffb277a7\n http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-sparc64_2.6.22.4-15.11_sparc.deb\n Size/MD5: 1002138 657b9f2f3b28d2585178c447c7e7745c\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-6694" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "BID", "id": "27555" }, { "db": "VULHUB", "id": "VHN-30056" }, { "db": "PACKETSTORM", "id": "65965" }, { "db": "PACKETSTORM", "id": "67518" }, { "db": "PACKETSTORM", "id": "66960" } ], "trust": 2.25 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-30056", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30056" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-6694", "trust": 3.1 }, { "db": "BID", "id": "27555", "trust": 2.8 }, { "db": "SECUNIA", "id": "28696", "trust": 2.5 }, { "db": "SECUNIA", "id": "30018", "trust": 1.7 }, { "db": "SECUNIA", "id": "30515", "trust": 1.7 }, { "db": "SECUNIA", "id": "29058", "trust": 1.7 }, { "db": "SECUNIA", "id": "30769", "trust": 1.7 }, { "db": "SECUNIA", "id": "28748", "trust": 1.7 }, { "db": "SECUNIA", "id": "29236", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0380", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-001057", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200801-420", "trust": 0.7 }, { "db": "MLIST", "id": "[LINUX-KERNEL] 20071122 [PATCH] PPC: CHRP - FIX POSSIBLE NULL POINTER DEREFERENCE", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2008:0055", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2008:0154", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1565", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1504", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1503", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-618-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-614-1", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "66960", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "65965", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-30056", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67518", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30056" }, { "db": "BID", "id": "27555" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "PACKETSTORM", "id": "65965" }, { "db": "PACKETSTORM", "id": "67518" }, { "db": "PACKETSTORM", "id": "66960" }, { "db": "CNNVD", "id": "CNNVD-200801-420" }, { "db": "NVD", "id": "CVE-2007-6694" } ] }, "id": "VAR-200801-0578", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-30056" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:12:55.057000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kernel-2.6.18-8.16AX", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=115" }, { "title": "kernel-2.6.18-53.11AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=215" }, { "title": "ChangeLog-2.6.24", "trust": 0.8, "url": "http://www.kernel.org/pub/linux/kernel/v2.6/changelog-2.6.24" }, { "title": "ChangeLog-2.4.37", "trust": 0.8, "url": "http://www.kernel.org/pub/linux/kernel/v2.4/changelog-2.4.37" }, { "title": "RHSA-2008:0154", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2008-0154.html" }, { "title": "RHSA-2008:0055", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2008-0055.html" }, { "title": "RHSA-2008:0055", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0055j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-noinfo", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30056" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "NVD", "id": "CVE-2007-6694" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/27555" }, { "trust": 2.0, "url": "http://rhn.redhat.com/errata/rhsa-2008-0055.html" }, { "trust": 1.9, "url": "http://marc.info/?l=linux-kernel\u0026m=119576191029571\u0026w=2" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "trust": 1.7, "url": "http://www.debian.org/security/2008/dsa-1503" }, { "trust": 1.7, "url": "http://www.debian.org/security/2008/dsa-1504" }, { "trust": 1.7, "url": "http://www.debian.org/security/2008/dsa-1565" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2008-0154.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/28696" }, { "trust": 1.7, "url": "http://secunia.com/advisories/28748" }, { "trust": 1.7, "url": "http://secunia.com/advisories/29058" }, { "trust": 1.7, "url": "http://secunia.com/advisories/29236" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30018" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30515" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30769" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2008/0380" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11215" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/614-1/" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0380" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6694" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6694" }, { "trust": 0.8, "url": "http://secunia.com/advisories/28696/" }, { "trust": 0.6, "url": "http://www.ubuntulinux.org/support/documentation/usn/usn-614-1" }, { "trust": 0.3, "url": "http://www.linux.org/" }, { "trust": 0.3, "url": "http://kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.37.log" }, { "trust": 0.3, "url": "http://lists.debian.org/debian-security-announce/2008/msg00077.html" }, { "trust": 0.3, "url": "https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-june/000721.html" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2008-102.htm" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0154.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-6694" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1375" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0007" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1294" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1669" }, { "trust": 0.1, "url": "http://marc.info/?l=linux-kernel\u0026amp;m=119576191029571\u0026amp;w=2" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx_7.1.0-8.34.8+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-386_2.6.22-15.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-rt_2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc64-smp_2.6.22-15.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx-dev_7.1.0-8.34.8+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-generic_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-tools-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-generic-di_2.6.22.4-15.11_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-k8_2.6.15-52.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-ume_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-xen_2.6.22-15.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx_7.1.0-8.37.6+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-dev_1.0.9631+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.10_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-generic-di_2.6.22-15.16_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-powerpc-di_2.6.20-17.12_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc-smp_2.6.22-15.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc64-smp_2.6.22-15.39_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-server-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5904" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-virtual_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new-dev_100.14.19+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-386_2.6.20-17.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-powerpc-di_2.6.15-52.10_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-sparc64-di_2.6.22-15.16_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx_1.0.9631+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-kernel-source_1.0.9631+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-lpiacompat_2.6.22-15.16_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-386_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-cell_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-sparc64-smp_2.6.20-17.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-kernel-devel_2.6.20-17.36_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc_2.6.22.4-15.11_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-generic_2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-rt_2.6.22-15.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-dev_1.0.9639+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-sparc64-smp_2.6.20.6-17.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-xen_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/avm-fritz-firmware-2.6.20-17_3.11+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-amd64-generic-di_2.6.15-52.10_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-k8_2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-player-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-generic_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-52_3.11+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-sparc64_2.6.22-15.39_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-cell_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc64-smp_2.6.15-52.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc-smp_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20_2.6.20-17.12.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-generic-di_2.6.22.4-15.11_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy-dev_1.0.7184+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-rt_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15_2.6.15-52.10.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-386-di_2.6.22-15.39_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-server_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22_2.6.22-15.16.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-server_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-server_2.6.22-15.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-lowlatency_2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-rt_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc-smp_2.6.15-52.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/fglrx-kernel-source_8.37.6+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6-17.31.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc64-smp_2.6.22.4-15.11_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-amd64-generic-di_2.6.15.12-52.3_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-generic_2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-ume_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy_1.0.7185+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/fglrx-control_8.34.8+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/fglrx-control_8.34.8+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-generic_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-xen_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-sparc64-di_2.6.20-17.12_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-rt_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.12-52.3_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-386-di_2.6.20.6-17.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc-smp_2.6.20.6-17.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc_2.6.22-15.39_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/fglrx-control_8.37.6+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-new-kernel-source_100.14.19+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-new-kernel-source_1.0.9755+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-386_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-generic_2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-sparc64_2.6.15.12-52.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-kernel-source_1.0.9639+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-generic-di_2.6.22.4-15.11_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-powerpc_2.6.22-15.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-386_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-386-di_2.6.20.6-17.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cdrom-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-kernel-source_1.0.9639+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/avm-fritz-firmware-2.6.22-15_3.11+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-powerpc-di_2.6.22.4-15.11_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/fglrx-kernel-source_8.37.6+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-new-kernel-source_1.0.9755+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-tools-kernel-modules-2.6.20-17_2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-kernel-source_1.0.9631+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-386-di_2.6.22.4-15.11_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc_2.6.20-17.12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-386_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-686_2.6.15-52.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc-smp_2.6.20-17.12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server-bigiron_2.6.20-17.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-legacy-kernel-source_1.0.7184+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-52.67_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-386_2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-generic_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new_1.0.9755+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-386-di_2.6.15-52.10_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-powerpc64-smp_2.6.20-17.12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-powerpc-di_2.6.20.6-17.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-rt_2.6.22-15.39_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-server_2.6.15-52.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/fglrx-control_8.37.6+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-generic_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-k7_2.6.15-52.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new-dev_1.0.9755+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.10_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-sparc64-smp_2.6.15-52.67_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/avm-fritz-firmware-2.6.22-15_3.11+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx_1.0.9639+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-sparc64-smp_2.6.22.4-15.11_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc64-smp_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-virtual_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-rt_2.6.22-15.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-generic_2.6.22-15.39_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/avm-fritz-kernel-source_3.11+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-sparc64_2.6.15-52.67_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-rt_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4-15.11.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-server_2.6.15-52.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-lpia_2.6.22-15.54_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-generic-di_2.6.20.6-17.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-server_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/avm-fritz-kernel-source_3.11+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-52.67_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-sparc64_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-386-di_2.6.15.12-52.3_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-386_2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-doc-2.6.20_2.6.20-17.36_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22_2.6.22.4-15.11.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-ume_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx_1.0.9631+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc64-smp_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-sparc64-smp_2.6.15-52.67_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-player-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-386-di_2.6.15.12-52.3_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-k7_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-common_2.6.20.6-17.31_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-sparc64_2.6.20.6-17.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-52.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-generic_2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-52-powerpc-di_2.6.15.12-52.3_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-sparc64_2.6.22-15.54_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-amd64-xeon_2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-powerpc_2.6.15-52.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy_1.0.7184+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-server_2.6.22-15.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-sparc64-smp_2.6.22-15.39_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15_2.6.15-52.10.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-source-2.6.22/linux-image-2.6.22-15-lpiacompat_2.6.22-15.54_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-generic_2.6.20-17.12_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-k7_2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc64-smp_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-386-di_2.6.22-15.16_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cdrom-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/avm-fritz-kernel-source_3.11+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-server_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-server_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-xen_2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-xen_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-sparc64_2.6.22-15.16_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-generic_2.6.22-15.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-sparc64-smp_2.6.15.12-52.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-sparc64_2.6.22-15.54_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/fglrx-kernel-source_8.34.8+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-generic_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-386_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-generic_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy-dev_1.0.7185+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-generic_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-server-bigiron_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc64-smp_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-xen_2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-386-di_2.6.15-52.10_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx_1.0.9639+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server_2.6.20-17.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-xeon_2.6.15-52.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-firmware-2.6.22-15-386-di_2.6.22.4-15.11_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc-smp_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-generic-di_2.6.20-17.12_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-sparc64-di_2.6.15-52.10_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-generic_2.6.22-15.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-sparc64-di_2.6.15-52.10_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-generic_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-k8_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-386_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-generic-di_2.6.22-15.16_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-generic_2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.12-52.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15_2.6.22-15.54_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-dev_1.0.9639+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/avm-fritz-firmware-2.6.20-17_3.11+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-xen_2.6.22-15.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-xeon_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-generic-di_2.6.22.4-15.11_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-lpia-di_2.6.22-15.16_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/avm-fritz-kernel-source_3.11+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-sparc64_2.6.15-52.67_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-powerpc-smp_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-legacy-kernel-source_1.0.7185+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-lowlatency_2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-legacy-kernel-source_1.0.7184+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-lpia_2.6.22-15.54_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-doc-2.6.22_2.6.22-15.54_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-server_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-virtual_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8776+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22_2.6.22-15.39.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8776+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc64-smp_2.6.20.6-17.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy_1.0.7185+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-sparc64_2.6.15-52.10_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-rt_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-powerpc-smp_2.6.22-15.39_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-xen_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy_1.0.7184+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-server_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-common_2.6.22.4-15.11_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-386-di_2.6.22-15.39_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-pcmcia-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new_100.14.19+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-lpiacompat_2.6.22-15.54_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx_7.1.0-8.34.8+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-kernel-devel_2.6.22-15.54_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/fglrx-kernel-source_8.34.8+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-source-2.6.22_2.6.22-15.54_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-dev_1.0.9631+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-powerpc-smp_2.6.22.4-15.11_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-686_2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-powerpc_2.6.15.12-52.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8776+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-server_2.6.20-17.12_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22_2.6.22-15.39.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-server_2.6.22-15.54_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-powerpc64-smp_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/vmware-server-kernel-modules-2.6.20-17_2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-amd64-server_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-sparc64-smp_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-powerpc-di_2.6.22-15.16_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-powerpc-di_2.6.15.12-52.3_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-lpia_2.6.22.4-15.11_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-386_2.6.15-52.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-17-lowlatency_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-686_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/socket-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-lpia_2.6.22-15.16_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kernel-image-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.20/nvidia-glx-legacy-dev_1.0.7184+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new-dev_100.14.19+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-powerpc_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-sparc64_2.6.22.4-15.11_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-xeon_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-generic_2.6.20-17.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20_2.6.20.6-17.31.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-generic-di_2.6.20.6-17.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new_1.0.9755+2.6.20.6-17.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-52-amd64-generic-di_2.6.15.12-52.3_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-generic_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-k8_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-sparc64-smp_2.6.22-15.54_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/storage-core-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22_2.6.22-15.16.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-powerpc-di_2.6.20.6-17.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-new-kernel-source_100.14.19+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/xorg-driver-fglrx-dev_7.1.0-8.34.8+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-modules-2.6.20-17-generic-di_2.6.20.6-17.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-debug-2.6.22-15-generic_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server-bigiron_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fb-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-52_3.11+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-sparc64-smp_2.6.22-15.54_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-cell-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-libc-dev_2.6.22-15.54_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-server-bigiron_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-386_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-386_2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-ume_2.6.22-15.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nic-restricted-modules-2.6.22-15-powerpc-di_2.6.22.4-15.11_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-secondary-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-17.36.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nvidia-glx-new-dev_1.0.9755+2.6.20.6-17.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-powerpc_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/block-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-generic_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/linux-restricted-modules-2.6.20-17-powerpc_2.6.20.6-17.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.12_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-386_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-sparc64-smp_2.6.15-52.10_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-core-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.12-52.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-386-di_2.6.22-15.39_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20_2.6.20-17.12.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx-dev_7.1.0-8.37.6+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-generic-di_2.6.20-17.12_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/updates-modules-2.6.20-17-386-di_2.6.20-17.12_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-server_2.6.22-15.39_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-server_2.6.22-15.39_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-generic-di_2.6.22-15.39_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-powerpc-smp_2.6.20-17.36_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/nvidia-glx-new_100.14.19+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx-dev_7.1.0-8.37.6+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-virtual_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-386_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-17-lowlatency_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/scsi-firmware-2.6.22-15-powerpc64-smp-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/nic-updates-modules-2.6.15-52-powerpc-di_2.6.15-52.10_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.20/linux-backports-modules-2.6.20-17-sparc64_2.6.20-17.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-amd64-server_2.6.15-52.67_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-amd64-generic_2.6.15-52.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-17-server_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/serial-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-52.67_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parport-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-686_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/scsi-updates-modules-2.6.15-52-amd64-generic-di_2.6.15-52.10_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-server_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-generic-di_2.6.22-15.39_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-image-2.6.22-15-generic_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.36_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-glx-legacy-dev_1.0.7185+2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-52-powerpc-smp_2.6.15-52.67_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-generic_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/message-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/updates-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.16_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/pata-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata-modules-2.6.22-15-powerpc-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-52-powerpc-smp_2.6.15.12-52.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/nvidia-legacy-kernel-source_1.0.7185+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-52-k7_2.6.15-52.67_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.22/linux-backports-modules-2.6.22-15-sparc64-smp_2.6.22-15.16_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/crypto-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/floppy-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-17-generic_2.6.20-17.36_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-17.36_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.12-52.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.20/nic-restricted-firmware-2.6.20-17-generic-di_2.6.20.6-17.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-rt_2.6.22.4-15.11_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-52-sparc64-di_2.6.15-52.67_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-usb-modules-2.6.22-15-generic-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4571" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-shared-modules-2.6.22-15-cell-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-xen_2.6.22-15.39_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-17-sparc64-di_2.6.20-17.36_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmcia-storage-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/nic-firmware-2.6.22-15-sparc64-di_2.6.22-15.39_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/scsi-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-52-amd64-generic-di_2.6.15-52.67_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-modules-2.6.22-15-generic-di_2.6.22-15.54_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/firewire-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.54_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/linux-ubuntu-modules-2.6.22-15-cell_2.6.22-15.39_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-17-generic-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.22/ubuntu-modules-2.6.22-15-powerpc-di_2.6.22-15.39_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/input-modules-2.6.22-15-sparc64-di_2.6.22-15.54_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-17-powerpc64-smp-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-17-386-di_2.6.20-17.36_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-52-powerpc64-smp-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.15/linux-backports-modules-2.6.15-52-server-bigiron_2.6.15-52.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-52-powerpc-di_2.6.15-52.67_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-modules-2.6.22-15-386-di_2.6.22-15.54_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-source-2.6.22/acpi-modules-2.6.22-15-lpia-di_2.6.22-15.54_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linux-headers-2.6.22-15-xen_2.6.22-15.54_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-52-386-di_2.6.15-52.67_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-17-powerpc-di_2.6.20-17.36_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-17-server_2.6.20-17.36_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.22/xorg-driver-fglrx_7.1.0-8.37.6+2.6.22.4-15.11_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.22/linux-restricted-modules-2.6.22-15-lpiacompat_2.6.22.4-15.11_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-386_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-virtual_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-virtual_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-firmware-2.6.24-18-generic-di_2.6.24.13-18.41_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-18-sparc64-smp_2.6.24-18.32_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-xen_2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-18-openvz_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/nic-firmware-2.6.24-18-generic-di_2.6.24-18.26_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-server_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-rt_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-powerpc64-smp_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-386_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.16_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-powerpc-smp_2.6.24-18.26_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-openvz_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-generic_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-18-openvz_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-18-virtual_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-kernel-source_96.43.05+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-openvz_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/avm-fritz-kernel-source_3.11+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-powerpc-smp_2.6.24.13-18.41_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-lpiacompat_2.6.24-18.16_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-18-generic_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-server_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-xen_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-modules-2.6.24-18-generic-di_2.6.24.13-18.41_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/fglrx-kernel-source_8-3+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-rt_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/scsi-firmware-2.6.24-18-powerpc64-smp-di_2.6.24-18.26_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/xorg-driver-fglrx-dev_7.1.0-8-3+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/scsi-firmware-2.6.24-18-generic-di_2.6.24-18.26_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24_2.6.24-18.16.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/avm-fritz-kernel-source_3.11+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-sparc64_2.6.24-18.26_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-rt_2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-modules-2.6.24-18-386-di_2.6.24.13-18.41_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-openvz_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-openvz_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-powerpc64-smp_2.6.24-18.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-generic_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-18-386_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-new-kernel-source_169.12+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-generic-di_2.6.24-18.16_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-lpiacompat_2.6.24-18.16_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-xen_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-powerpc_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/fglrx-amdcccle_2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-18-386_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-386_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/nic-firmware-2.6.24-18-powerpc64-smp-di_2.6.24-18.26_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/scsi-firmware-2.6.24-18-sparc64-di_2.6.24-18.26_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-rt_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-18-generic_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx-new_169.12+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-18.32.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-glx-legacy-dev_71.86.04+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-sparc64_2.6.24-18.26_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-xen_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-lpia_2.6.24-18.26_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-18.32_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-firmware-2.6.24-18-386-di_2.6.24.13-18.41_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-lpiacompat_2.6.24-18.26_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-386-di_2.6.24-18.16_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-openvz_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-powerpc64-smp_2.6.24.13-18.41_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx-dev_96.43.05+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/nic-firmware-2.6.24-18-sparc64-di_2.6.24-18.26_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-generic_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-sparc64-di_2.6.24-18.16_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-generic_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/nic-firmware-2.6.24-18-generic-di_2.6.24-18.26_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-lpia_2.6.24-18.26_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/xorg-driver-fglrx_7.1.0-8-3+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-18-server_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-xen_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-lpiacompat_2.6.24-18.32_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-sparc64_2.6.24-18.16_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-modules-2.6.24-18-powerpc-di_2.6.24.13-18.41_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-openvz_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-18-lpia_2.6.24-18.32_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-generic_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-openvz_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-rt_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-18-rt_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-18-powerpc_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/fglrx-kernel-source_8-3+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24_2.6.24.13.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-firmware-2.6.24-18-generic-di_2.6.24.13-18.41_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-generic_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/scsi-firmware-2.6.24-18-generic-di_2.6.24-18.26_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-server_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-generic_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-openvz_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-openvz_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-sparc64_2.6.24-18.32_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-18.32.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-server_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-powerpc64-smp_2.6.24-18.26_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-powerpc_2.6.24-18.16_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-powerpc_2.6.24-18.26_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-sparc64_2.6.24.13-18.41_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-sparc64-smp_2.6.24-18.26_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-18-xen_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-xen_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-powerpc_2.6.24-18.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-generic_2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/ubuntu-modules-2.6.24-18-generic-di_2.6.24-18.26_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-lpiacompat_2.6.24.13-18.41_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-virtual_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/ubuntu-modules-2.6.24-18-generic-di_2.6.24-18.26_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/avm-fritz-firmware-2.6.24-18_3.11+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx-new_169.12+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/ubuntu-modules-2.6.24-18-386-di_2.6.24-18.26_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-xen_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-386_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/scsi-firmware-2.6.24-18-386-di_2.6.24-18.26_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-server_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-firmware-2.6.24-18-powerpc-di_2.6.24.13-18.41_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-rt_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-powerpc-smp_2.6.24-18.26_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-rt_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-xen_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-sparc64-smp_2.6.24-18.16_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-glx-legacy-dev_71.86.04+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-18.32_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-rt_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-lpiacompat_2.6.24-18.26_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-18.32_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-server_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-rt_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18_2.6.24-18.32_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-legacy-kernel-source_71.86.04+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/fglrx-control_8-3+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-powerpc-di_2.6.24-18.16_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-generic_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-18.32_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-18-generic_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-18-powerpc64-smp_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24_2.6.24-18.16.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-sparc64-smp_2.6.24-18.16_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-powerpc-smp_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-powerpc64-smp_2.6.24-18.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-glx-legacy_71.86.04+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-openvz_2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/nic-firmware-2.6.24-18-386-di_2.6.24-18.26_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-server_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-18-powerpc-smp_2.6.24-18.32_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-sparc64-smp_2.6.24-18.26_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-powerpc_2.6.24.13-18.41_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx_96.43.05+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-common_2.6.24.13-18.41_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/xorg-driver-fglrx_7.1.0-8-3+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24_2.6.24.13-18.41.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx-new-dev_169.12+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-xen_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-18-server_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-18-generic_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1675" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/avm-fritz-firmware-2.6.24-18_3.11+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx-dev_96.43.05+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-18-xen_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/ubuntu-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.26_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-glx-legacy_71.86.04+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-18-server_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24_2.6.24.13-18.41.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-rt_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-rt_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nic-restricted-modules-2.6.24-18-generic-di_2.6.24.13-18.41_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-server_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-powerpc-smp_2.6.24-18.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-generic-di_2.6.24-18.16_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-lpia_2.6.24-18.16_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-386_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-generic_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-18.32_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/ubuntu-modules-2.6.24-18-sparc64-di_2.6.24-18.26_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-new-kernel-source_169.12+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-sparc64_2.6.24-18.16_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx_96.43.05+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-generic_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-rt_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/scsi-firmware-2.6.24-18-powerpc-di_2.6.24-18.26_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/fglrx-control_8-3+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-powerpc-smp_2.6.24-18.16_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-openvz_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/nvidia-glx-new-dev_169.12+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/nic-firmware-2.6.24-18-powerpc-di_2.6.24-18.26_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-server_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-generic_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-18-server_2.6.24-18.32_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-18-sparc64_2.6.24-18.32_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-sparc64-smp_2.6.24.13-18.41_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-sparc64-smp_2.6.24-18.32_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-virtual_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-18-virtual_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-virtual_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-18-lpiacompat_2.6.24-18.32_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-kernel-source_96.43.05+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-xen_2.6.24-18.26_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/fglrx-amdcccle_2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/xorg-driver-fglrx-dev_7.1.0-8-3+2.6.24.13-18.41_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24_2.6.24-18.26.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-server_2.6.24-18.26_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-18-powerpc64-smp-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-xen_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-lpia_2.6.24.13-18.41_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-18-rt_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/ubuntu-modules-2.6.24-18-powerpc-di_2.6.24-18.26_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24-18-powerpc64-smp_2.6.24-18.26_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.24/nvidia-legacy-kernel-source_71.86.04+2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-18-sparc64-di_2.6.24-18.32_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux-backports-modules-2.6.24/updates-modules-2.6.24-18-lpia-di_2.6.24-18.16_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-18-server_2.6.24-18.32_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-18-powerpc-di_2.6.24-18.32_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-18-lpia_2.6.24-18.32_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-lpia_2.6.24-18.16_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux-ubuntu-modules-2.6.24/linux-headers-lum-2.6.24-18-powerpc_2.6.24-18.26_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-386_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-headers-lbm-2.6.24-18-xen_2.6.24-18.16_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-18-386-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-backports-modules-2.6.24/linux-backports-modules-2.6.24-18-openvz_2.6.24-18.16_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-18-generic-di_2.6.24-18.32_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.24/linux-restricted-modules-2.6.24-18-server_2.6.24.13-18.41_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ubuntu-modules-2.6.24/linux-ubuntu-modules-2.6.24_2.6.24-18.26.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-18-generic-di_2.6.24-18.32_amd64.udeb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30056" }, { "db": "BID", "id": "27555" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "PACKETSTORM", "id": "65965" }, { "db": "PACKETSTORM", "id": "67518" }, { "db": "PACKETSTORM", "id": "66960" }, { "db": "CNNVD", "id": "CNNVD-200801-420" }, { "db": "NVD", "id": "CVE-2007-6694" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-30056" }, { "db": "BID", "id": "27555" }, { "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "db": "PACKETSTORM", "id": "65965" }, { "db": "PACKETSTORM", "id": "67518" }, { "db": "PACKETSTORM", "id": "66960" }, { "db": "CNNVD", "id": "CNNVD-200801-420" }, { "db": "NVD", "id": "CVE-2007-6694" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-01-29T00:00:00", "db": "VULHUB", "id": "VHN-30056" }, { "date": "2008-01-31T00:00:00", "db": "BID", "id": "27555" }, { "date": "2008-02-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "date": "2008-05-01T22:34:19", "db": "PACKETSTORM", "id": "65965" }, { "date": "2008-06-20T19:14:41", "db": "PACKETSTORM", "id": "67518" }, { "date": "2008-06-04T00:42:46", "db": "PACKETSTORM", "id": "66960" }, { "date": "2008-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200801-420" }, { "date": "2008-01-29T20:00:00", "db": "NVD", "id": "CVE-2007-6694" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-03T00:00:00", "db": "VULHUB", "id": "VHN-30056" }, { "date": "2008-09-08T19:31:00", "db": "BID", "id": "27555" }, { "date": "2008-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001057" }, { "date": "2008-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200801-420" }, { "date": "2018-10-03T21:52:43.213000", "db": "NVD", "id": "CVE-2007-6694" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-420" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel of chrp_show_cpuinfo() Service disruption in functions (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001057" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-420" } ], "trust": 0.6 } }
rhsa-2008_0055
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and a bug in the\nRed Hat Enterprise Linux 4 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated kernel packages fix the following security issues:\n\nA flaw was found in the virtual filesystem (VFS). A local unprivileged\nuser could truncate directories to which they had write permission; this\ncould render the contents of the directory inaccessible. (CVE-2008-0001,\nImportant)\n\nA flaw was found in the implementation of ptrace. A local unprivileged user\ncould trigger this flaw and possibly cause a denial of service (system\nhang). (CVE-2007-5500, Important)\n\nA flaw was found in the way the Red Hat Enterprise Linux 4 kernel handled\npage faults when a CPU used the NUMA method for accessing memory on Itanium\narchitectures. A local unprivileged user could trigger this flaw and cause\na denial of service (system panic). (CVE-2007-4130, Important)\n\nA possible NULL pointer dereference was found in the chrp_show_cpuinfo\nfunction when using the PowerPC architecture. This may have allowed a local\nunprivileged user to cause a denial of service (crash).\n(CVE-2007-6694, Moderate)\n\nA flaw was found in the way core dump files were created. If a local user\ncan get a root-owned process to dump a core file into a directory, which\nthe user has write access to, they could gain read access to that core\nfile. This could potentially grant unauthorized access to sensitive\ninformation. (CVE-2007-6206, Moderate)\n\nTwo buffer overflow flaws were found in the Linux kernel ISDN subsystem. A\nlocal unprivileged user could use these flaws to cause a denial of\nservice. (CVE-2007-6063, CVE-2007-6151, Moderate)\n\nAs well, these updated packages fix the following bug:\n\n* when moving volumes that contain multiple segments, and a mirror segment\nis not the first in the mapping table, running the \"pvmove /dev/[device]\n/dev/[device]\" command caused a kernel panic. A \"kernel: Unable to handle\nkernel paging request at virtual address [address]\" error was logged by\nsyslog.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0055", "url": "https://access.redhat.com/errata/RHSA-2008:0055" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "179665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=179665" }, { "category": "external", "summary": "382161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=382161" }, { "category": "external", "summary": "392101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101" }, { "category": "external", "summary": "396751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "category": "external", "summary": "396861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861" }, { "category": "external", "summary": "425111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425111" }, { "category": "external", "summary": "428637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428637" }, { "category": "external", "summary": "428791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0055.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T16:52:03+00:00", "generator": { "date": "2024-11-05T16:52:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2008:0055", "initial_release_date": "2008-01-31T18:23:00+00:00", "revision_history": [ { "date": "2008-01-31T18:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-01-31T13:35:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:52:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-67.0.4.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.ia64", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.ia64", "product_id": "kernel-0:2.6.9-67.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.src", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.src", "product_id": "kernel-0:2.6.9-67.0.4.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "product_id": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-67.0.4.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.ppc64", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64", "product_id": "kernel-0:2.6.9-67.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.s390x", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.s390x", "product_id": "kernel-0:2.6.9-67.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.4.EL.s390", "product": { "name": "kernel-0:2.6.9-67.0.4.EL.s390", "product_id": "kernel-0:2.6.9-67.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "product_id": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4130", "discovery_date": "2007-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "179665" } ], "notes": [ { "category": "description", "text": "The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "panic caused by set_mempolicy with MPOL_BIND", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4130" }, { "category": "external", "summary": "RHBZ#179665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=179665" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4130", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4130" } ], "release_date": "2006-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "panic caused by set_mempolicy with MPOL_BIND" }, { "cve": "CVE-2007-5500", "discovery_date": "2007-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "382161" } ], "notes": [ { "category": "description", "text": "The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel hang via userspace PTRACE+waitid", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5500" }, { "category": "external", "summary": "RHBZ#382161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=382161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5500", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5500" } ], "release_date": "2007-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel hang via userspace PTRACE+waitid" }, { "cve": "CVE-2007-6063", "discovery_date": "2007-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "392101" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Linux Kernel isdn_net_setcfg buffer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6063" }, { "category": "external", "summary": "RHBZ#392101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6063", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6063" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063" } ], "release_date": "2007-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Linux Kernel isdn_net_setcfg buffer overflow" }, { "cve": "CVE-2007-6151", "discovery_date": "2007-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "425111" } ], "notes": [ { "category": "description", "text": "The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "I4L: fix isdn_ioctl memory issue", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6151" }, { "category": "external", "summary": "RHBZ#425111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6151", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6151" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6151", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6151" } ], "release_date": "2007-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "I4L: fix isdn_ioctl memory issue" }, { "cve": "CVE-2007-6206", "discovery_date": "2004-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "396861" } ], "notes": [ { "category": "description", "text": "The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "Issue with core dump owner", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6206" }, { "category": "external", "summary": "RHBZ#396861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6206", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206" } ], "release_date": "2004-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Issue with core dump owner" }, { "cve": "CVE-2007-6694", "discovery_date": "2007-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "396751" } ], "notes": [ { "category": "description", "text": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "/proc/cpuinfo DoS on some ppc machines", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6694" }, { "category": "external", "summary": "RHBZ#396751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6694", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694" } ], "release_date": "2007-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "/proc/cpuinfo DoS on some ppc machines" }, { "cve": "CVE-2008-0001", "discovery_date": "2008-01-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "428791" } ], "notes": [ { "category": "description", "text": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: filesystem corruption by unprivileged user via directory truncation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0001" }, { "category": "external", "summary": "RHBZ#428791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001" } ], "release_date": "2008-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-31T18:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-0:2.6.9-67.0.4.EL.src", "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.4.EL.src", "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-0:2.6.9-67.0.4.EL.src", "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-0:2.6.9-67.0.4.EL.src", "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0055" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: filesystem corruption by unprivileged user via directory truncation" } ] }
rhsa-2008_0154
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix various security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw in the hypervisor for hosts running on Itanium architectures\nallowed an Intel VTi domain to read arbitrary physical memory from other\nIntel VTi domains, which could make information available to unauthorized\nusers. (CVE-2007-6207, Important)\n\n* two buffer overflow flaws were found in ISDN subsystem. A local\nunprivileged user could use these flaws to cause a denial of service.\n(CVE-2007-5938: Important, CVE-2007-6063: Moderate)\n\n* a possible NULL pointer dereference was found in the subsystem used for\nshowing CPU information, as used by CHRP systems on PowerPC architectures.\nThis may have allowed a local unprivileged user to cause a denial of\nservice (crash). (CVE-2007-6694, Moderate)\n\n* a flaw was found in the handling of zombie processes. A local user could\ncreate processes that would not be properly reaped, possibly causing a\ndenial of service. (CVE-2006-6921, Moderate)\n\nAs well, these updated packages fix the following bugs:\n\n* a bug was found in the Linux kernel audit subsystem. When the audit\ndaemon was setup to log the execve system call with a large number of\narguments, the kernel could run out of memory, causing a kernel panic.\n\n* on IBM System z architectures, using the IBM Hardware Management Console\nto toggle IBM FICON channel path ids (CHPID) caused a file ID miscompare,\npossibly causing data corruption.\n\n* when running the IA-32 Execution Layer (IA-32EL) or a Java VM on Itanium\narchitectures, a bug in the address translation in the hypervisor caused\nthe wrong address to be registered, causing Dom0 to hang.\n\n* on Itanium architectures, frequent Corrected Platform Error errors may\nhave caused the hypervisor to hang.\n\n* when enabling a CPU without hot plug support, routines for checking the\npresence of the CPU were missing. The CPU tried to access its own\nresources, causing a kernel panic.\n\n* after updating to kernel-2.6.18-53.el5, a bug in the CCISS driver caused\nthe HP Array Configuration Utility CLI to become unstable, possibly causing\na system hang, or a kernel panic.\n\n* a bug in NFS directory caching could have caused different hosts to have\ndifferent views of NFS directories.\n\n* on Itanium architectures, the Corrected Machine Check Interrupt masked\nhot-added CPUs as disabled.\n\n* when running Oracle database software on the Intel 64 and AMD64\narchitectures, if an SGA larger than 4GB was created, and had hugepages\nallocated to it, the hugepages were not freed after database shutdown.\n\n* in a clustered environment, when two or more NFS clients had the same\nlogical volume mounted, and one of them modified a file on the volume, NULL\ncharacters may have been inserted, possibly causing data corruption.\n\nThese updated packages resolve several severe issues in the lpfc driver:\n\n* a system hang after LUN discovery.\n\n* a general fault protection, a NULL pointer dereference, or slab\ncorruption could occur while running a debug on the kernel.\n\n* the inability to handle kernel paging requests in \"lpfc_get_scsi_buf\".\n\n* erroneous structure references caused certain FC discovery routines to\nreference and change \"lpfc_nodelist\" structures, even after they were\nfreed.\n\n* the lpfc driver failed to interpret certain fields correctly, causing\ntape backup software to fail. Tape drives reported \"Illegal Request\".\n\n* the lpfc driver did not clear structures correctly, resulting in SCSI\nI/Os being rejected by targets, and causing errors.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0154", "url": "https://access.redhat.com/errata/RHSA-2008:0154" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "302921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=302921" }, { "category": "external", "summary": "310651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=310651" }, { "category": "external", "summary": "385861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=385861" }, { "category": "external", "summary": "392101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101" }, { "category": "external", "summary": "396751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "category": "external", "summary": "402911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=402911" }, { "category": "external", "summary": "406881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=406881" }, { "category": "external", "summary": "424191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=424191" }, { "category": "external", "summary": "424271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=424271" }, { "category": "external", "summary": "428290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428290" }, { "category": "external", "summary": "429108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429108" }, { "category": "external", "summary": "429515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429515" }, { "category": "external", "summary": "429539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429539" }, { "category": "external", "summary": "430632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430632" }, { "category": "external", "summary": "431522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431522" }, { "category": "external", "summary": "432078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432078" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0154.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-05T16:52:45+00:00", "generator": { "date": "2024-11-05T16:52:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2008:0154", "initial_release_date": "2008-03-05T13:56:00+00:00", "revision_history": [ { "date": "2008-03-05T13:56:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-03-05T08:58:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:52:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-debug-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-devel-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-xen-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-PAE-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.14.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.14.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.i386", "product_id": "kernel-headers-0:2.6.18-53.1.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.14.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.14.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-53.1.14.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-53.1.14.el5.noarch", "product_id": "kernel-doc-0:2.6.18-53.1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.14.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-53.1.14.el5.src", "product": { "name": "kernel-0:2.6.18-53.1.14.el5.src", "product_id": "kernel-0:2.6.18-53.1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.14.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-debug-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-devel-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-headers-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-xen-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.14.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.14.el5.ppc64", "product": { "name": "kernel-0:2.6.18-53.1.14.el5.ppc64", "product_id": "kernel-0:2.6.18-53.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.14.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc", "product_id": "kernel-headers-0:2.6.18-53.1.14.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.14.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-debug-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-devel-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-headers-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.14.el5.s390x", "product": { "name": "kernel-0:2.6.18-53.1.14.el5.s390x", "product_id": "kernel-0:2.6.18-53.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.14.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.14.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.14.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.14.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.14.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-6921", "discovery_date": "2006-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "302921" } ], "notes": [ { "category": "description", "text": "Unspecified versions of the Linux kernel allow local users to cause a denial of service (unrecoverable zombie process) via a program with certain instructions that prevent init from properly reaping a child whose parent has died.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: denial of service with wedged processes", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6921" }, { "category": "external", "summary": "RHBZ#302921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=302921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6921", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6921" } ], "release_date": "2006-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-05T13:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0154" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: denial of service with wedged processes" }, { "cve": "CVE-2007-5938", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2007-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "385861" } ], "notes": [ { "category": "description", "text": "The iwl_set_rate function in compatible/iwl3945-base.c in iwlwifi 1.1.21 and earlier dereferences an iwl_get_hw_mode return value without checking for NULL, which might allow remote attackers to cause a denial of service (kernel panic) via unspecified vectors during module initialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "NULL dereference in iwl driver", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5938" }, { "category": "external", "summary": "RHBZ#385861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=385861" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5938", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5938" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5938", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5938" } ], "release_date": "2007-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-05T13:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0154" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "NULL dereference in iwl driver" }, { "cve": "CVE-2007-6063", "discovery_date": "2007-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "392101" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Linux Kernel isdn_net_setcfg buffer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6063" }, { "category": "external", "summary": "RHBZ#392101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6063", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6063" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063" } ], "release_date": "2007-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-05T13:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0154" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Linux Kernel isdn_net_setcfg buffer overflow" }, { "cve": "CVE-2007-6207", "discovery_date": "2007-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "406881" } ], "notes": [ { "category": "description", "text": "Xen 3.x, possibly before 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains.", "title": "Vulnerability description" }, { "category": "summary", "text": "Security: some HVM domain can access another domain memory.", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6207" }, { "category": "external", "summary": "RHBZ#406881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=406881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6207", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6207" } ], "release_date": "2007-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-05T13:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0154" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Security: some HVM domain can access another domain memory." }, { "cve": "CVE-2007-6694", "discovery_date": "2007-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "396751" } ], "notes": [ { "category": "description", "text": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "/proc/cpuinfo DoS on some ppc machines", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6694" }, { "category": "external", "summary": "RHBZ#396751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6694", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694" } ], "release_date": "2007-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-05T13:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-0:2.6.18-53.1.14.el5.src", "5Client:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-0:2.6.18-53.1.14.el5.src", "5Server:kernel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.14.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0154" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "/proc/cpuinfo DoS on some ppc machines" } ] }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.