ID

VAR-200704-0740


CVE

CVE-2007-2242


TITLE

IPv6 Type 0 Route Headers allow sender to control routing

Trust: 0.8

sources: CERT/CC: VU#267289

DESCRIPTION

The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers. This vulnerability may allow an attacker to cause a denial-of-service condition. IPv6 Type 0 Routing header contains service disruption (DoS) There is a problem. IPv6 specification (RFC2460) So as an extension header Type 0 Specifies the routing header. this is IPv4 In loose source routing Is similar to IPv6 Nodes are required to process packets with this extension header. But using this feature DoS The possibility of attack is pointed out.Service operation interruption by a third party (DoS) An attack may be carried out. For example, it can be assumed that this attack consumes communication bandwidth. IPv6 protocol implementations are prone to a denial-of-service vulnerability due to a design error. This issue is related to the issue discussed in BID 22210 (Cisco IOS IPv6 Source Routing Remote Memory Corruption Vulnerability). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-07:03.ipv6 Security Advisory The FreeBSD Project Topic: IPv6 Routing Header 0 is dangerous Category: core Module: ipv6 Announced: 2007-04-26 Credits: Philippe Biondi, Arnaud Ebalard, Jun-ichiro itojun Hagino Affects: All FreeBSD releases. Corrected: 2007-04-24 11:42:42 UTC (RELENG_6, 6.2-STABLE) 2007-04-26 23:42:23 UTC (RELENG_6_2, 6.2-RELEASE-p4) 2007-04-26 23:41:59 UTC (RELENG_6_1, 6.1-RELEASE-p16) 2007-04-24 11:44:23 UTC (RELENG_5, 5.5-STABLE) 2007-04-26 23:41:27 UTC (RELENG_5_5, 5.5-RELEASE-p12) CVE Name: CVE-2007-2242 I. II. III. An attacker can use vulnerable hosts to "concentrate" a denial of service attack against a victim host or network; that is, a set of packets sent over a period of 30 seconds or more could be constructed such that they all arrive at the victim within a period of 1 second or less. Other attacks may also be possible. IV. Workaround No workaround is available. V. Perform one of the following: 1) Upgrade your vulnerable system to 5-STABLE, or 6-STABLE, or to the RELENG_6_2, RELENG_6_1, or RELENG_5_5 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 5.5, 6.1, and 6.2 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch http://security.FreeBSD.org/patches/SA-07:03/ipv6.patch # fetch http://security.FreeBSD.org/patches/SA-07:03/ipv6.patch.asc b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in <URL:http://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ------------------------------------------------------------------------- RELENG_5 src/sys/netinet6/in6.h 1.35.2.5 src/sys/netinet6/in6_proto.c 1.29.2.5 src/sys/netinet6/route6.c 1.10.4.2 RELENG_5_5 src/UPDATING 1.342.2.35.2.12 src/sys/conf/newvers.sh 1.62.2.21.2.14 src/sys/netinet6/in6.h 1.35.2.3.2.1 src/sys/netinet6/in6_proto.c 1.29.2.4.2.1 src/sys/netinet6/route6.c 1.10.4.1.4.1 RELENG_6 src/sys/netinet6/in6.h 1.36.2.8 src/sys/netinet6/in6_proto.c 1.32.2.6 src/sys/netinet6/route6.c 1.11.2.2 RELENG_6_2 src/UPDATING 1.416.2.29.2.7 src/sys/conf/newvers.sh 1.69.2.13.2.7 src/sys/netinet6/in6.h 1.36.2.7.2.1 src/sys/netinet6/in6_proto.c 1.32.2.5.2.1 src/sys/netinet6/route6.c 1.11.2.1.4.1 RELENG_6_1 src/UPDATING 1.416.2.22.2.18 src/sys/conf/newvers.sh 1.69.2.11.2.18 src/sys/netinet6/in6.h 1.36.2.6.2.1 src/sys/netinet6/in6_proto.c 1.32.2.4.2.1 src/sys/netinet6/route6.c 1.11.2.1.2.1 - ------------------------------------------------------------------------- VII. References http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2242 The latest revision of this advisory is available at http://security.FreeBSD.org/advisories/FreeBSD-SA-07:03.ipv6.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (FreeBSD) iD4DBQFGMTlvFdaIBMps37IRApu3AJYsifWIDLcyxNcMdnkvw4nBqXFoAJ43+IzB M5sIdCmLQABByFlbMB2BjQ== =OrNf -----END PGP SIGNATURE----- . =========================================================== Ubuntu Security Notice USN-486-1 July 17, 2007 linux-source-2.6.17 vulnerabilities CVE-2006-7203, CVE-2007-0005, CVE-2007-1000, CVE-2007-1353, CVE-2007-1861, CVE-2007-2242, CVE-2007-2453, CVE-2007-2525, CVE-2007-2875, CVE-2007-2876, CVE-2007-2878 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.10: linux-image-2.6.17-12-386 2.6.17.1-12.39 linux-image-2.6.17-12-generic 2.6.17.1-12.39 linux-image-2.6.17-12-hppa32 2.6.17.1-12.39 linux-image-2.6.17-12-hppa64 2.6.17.1-12.39 linux-image-2.6.17-12-itanium 2.6.17.1-12.39 linux-image-2.6.17-12-mckinley 2.6.17.1-12.39 linux-image-2.6.17-12-powerpc 2.6.17.1-12.39 linux-image-2.6.17-12-powerpc-smp 2.6.17.1-12.39 linux-image-2.6.17-12-powerpc64-smp 2.6.17.1-12.39 linux-image-2.6.17-12-server 2.6.17.1-12.39 linux-image-2.6.17-12-server-bigiron 2.6.17.1-12.39 linux-image-2.6.17-12-sparc64 2.6.17.1-12.39 linux-image-2.6.17-12-sparc64-smp 2.6.17.1-12.39 After a standard system upgrade you need to reboot your computer to effect the necessary changes. ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.10 kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (linux-386, linux-powerpc, linux-amd64-generic, etc), a standard system upgrade will automatically perform this as well. Details follow: The compat_sys_mount function allowed local users to cause a denial of service when mounting a smbfs filesystem in compatibility mode. (CVE-2006-7203) The Omnikey CardMan 4040 driver (cm4040_cs) did not limit the size of buffers passed to read() and write(). A local attacker could exploit this to execute arbitrary code with kernel privileges. (CVE-2007-0005) Due to a variable handling flaw in the ipv6_getsockopt_sticky() function a local attacker could exploit the getsockopt() calls to read arbitrary kernel memory. This could disclose sensitive data. (CVE-2007-1000) Ilja van Sprundel discovered that Bluetooth setsockopt calls could leak kernel memory contents via an uninitialized stack buffer. A local attacker could exploit this flaw to view sensitive kernel information. (CVE-2007-1353) A flaw was discovered in the handling of netlink messages. Local attackers could cause infinite recursion leading to a denial of service. (CVE-2007-2242) The random number generator was hashing a subset of the available entropy, leading to slightly less random numbers. Additionally, systems without an entropy source would be seeded with the same inputs at boot time, leading to a repeatable series of random numbers. (CVE-2007-2453) A flaw was discovered in the PPP over Ethernet implementation. Local attackers could manipulate ioctls and cause kernel memory consumption leading to a denial of service. (CVE-2007-2525) An integer underflow was discovered in the cpuset filesystem. If mounted, local attackers could obtain kernel memory using large file offsets while reading the tasks file. This could disclose sensitive data. (CVE-2007-2875) Vilmos Nebehaj discovered that the SCTP netfilter code did not correctly validate certain states. A remote attacker could send a specially crafted packet causing a denial of service. (CVE-2007-2876) Luca Tettamanti discovered a flaw in the VFAT compat ioctls on 64-bit systems. A local attacker could corrupt a kernel_dirent struct and cause a denial of service. (CVE-2007-2878) Updated packages for Ubuntu 6.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.39.diff.gz Size/MD5: 2086047 d07f76ec226f706d89a66e0ba3d34d44 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.39.dsc Size/MD5: 2321 af3e3fecf1d80a7aca131bde9a871966 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1.orig.tar.gz Size/MD5: 59339565 2e5451201e38e865cbc7b0717fa124a1 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-doc-2.6.17_2.6.17.1-12.39_all.deb Size/MD5: 4506664 f3307a7a1115f8a279a7ad52d09b251f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-kernel-devel_2.6.17.1-12.39_all.deb Size/MD5: 1097522 5d80796fb704894d1e083d7a4ea4dfa8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.39_all.deb Size/MD5: 46079376 a53f61537b12be4c1886f2578daad04d amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 28612 0b1c6e3ab9284311bfb96e1dcb812fba http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 50502 074faf23893f63cef2aaae18f0bf1bc8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 2450 56e11b173c9c8dad3a233777d1c412f6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 40800 c3f23e9745643e33945c50afcd3d1a51 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 113554 98ace1d3b7e9409e5273daaa7b28495c http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 44000 323e5cc16b63fd99d133539ddfa2e573 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 54026 2c1a7a6a9036ef0d9d16b82f78e56daa http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 189518 10a6605cfc28a6aefd355f1ef716d599 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 40036 41ffb86ffa5d8e12c82c857a1d960b77 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 167756 fc36e453103ee9429469260e56697ac5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 60450 9672dfd9f1976cca1db9d9057027c025 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 154560 94fa3f8b54017625b2856e0399450b36 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 314682 64afdc80508ad9123b636165fe5ada0e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 105986 b9f5813e5daec7a7369e86273902a33e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 1904480 b352f8bcf7f21620ef27b7ac745bd089 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-generic_2.6.17.1-12.39_amd64.deb Size/MD5: 907094 ffde52fea07954ed03bbc4b151a634ef http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server_2.6.17.1-12.39_amd64.deb Size/MD5: 913466 19b6851ea5c16833ac07e737d1637591 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_amd64.deb Size/MD5: 7429356 31cf4ff7a0b942b456abb41effb01e83 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-generic_2.6.17.1-12.39_amd64.deb Size/MD5: 23872310 671651c6b5237c4b4f9ce0fd87322f81 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server_2.6.17.1-12.39_amd64.deb Size/MD5: 24446348 54c63b9888616e3dc5181235faec4f7b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-generic_2.6.17.1-12.39_amd64.deb Size/MD5: 2339902 6456d0226e101c5ca46568c0ac07dbc4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server_2.6.17.1-12.39_amd64.deb Size/MD5: 2338992 4c5a331da5de8f7bd6e901f40d3065cc http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_amd64.deb Size/MD5: 1771236 c3dda7fd5856dedfadb6aeb86b1ee26b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 16792 f4e8db0d007fbf12243bfb4f73e11f54 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 279160 31ace8b9fd8a5783c00432e80ba83e9b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 256924 6c0102de5f392c6255b42d13f36eae6c http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 1048458 e85815750204baa4e5121565a05b67e6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 2103870 3956e33e4d012431810b6bd043175b06 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 164430 02411ba7631f36224cc35f8e1467bcd5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 10506 7e32828a1b360eefa21a2900a1ec07f8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 93362 c0689220349c25b4d18561451af090db http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 52572 91e1eaf7bc0a1a95deb1e20aa31ee356 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 39814 be7f95804371cf80449ab00ab2b09ef7 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 79812 8a5c2917c8e41d88fe4988be3fdf350f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 6336 44fad8c6ef38c0f4054a89482c23b8b1 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 9374 e0be83662c3f41cd923cf04523dec121 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 62718 d582dc41e8dc6f9b4264457c40211e8d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 138620 e8b5351aed98cdf9973ad93d132b7905 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 115700 450d8ca2ed5957a321d6c009f3e24847 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 90612 1dc5df5c43ec890f05354ed688cdeb2e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 1286170 5615ec4ce076886b2a0b801c97742102 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 80594 1e611e34d769a2a9311e45b3854f4640 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 13480 4d84bc980757d03a15a41394b1f9a3f1 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 76264 1de9fdeda144490e5950d96c8d6288a4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 36064 0e24439c0e8bc55dd9535faab3ec3b24 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 151824 4ef6ee14338003c6bb10427c78c31214 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 53548 374272c14cf4d906d005a3e607970e58 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb Size/MD5: 323418 51ef4685d9324c266635c8a11ebb59ea i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 21210 7da843c5002c8ea327ccac6e532e8447 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 23806 1a35e88cc19994aacb7a6b717c639c4f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 43876 0f8440080102c2a8a9f5c0f79c6bcdc4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 44474 2572438a66d363fcd09cbfa20bb87a6d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 104794 3edc3cc7b75daa93b9fa2a1dd0832b4b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 49408 902b83472a56965fd23558b65848286a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 2362 40d930bb1dd7fcdc88531537ac867601 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 2388 35cbbb51e8258c121b3976abaf028ed3 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 35308 396422cb15b83177dcc6940df3503a6e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 36728 2382993640cdc93dcecb8aa07cb9bb83 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 98292 fc5ac72df3f19c0fac45c647e64e6759 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 103506 da1c50087cc38d9e618e0abc50c177c4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 38470 9cb694eacd4f35d8428806874930d804 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 39222 8f4f537c7bdf54734b573486d3793928 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 44262 f2558cf0898e04a3fea19c0e89c4ce85 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 44668 62ba6d29e30a08e397bc711c3714c81a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 172752 24357036194451f6e58fa166d5971eeb http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 175190 88d8a49796dc3a7c55614825470c64ad http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 33750 6700b5682e3fe81736b8304b1c71189f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 34712 e7634d20ac3160d0571c2488e9ecd96f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 140556 2a6634cb2d87c0cce91f516441361147 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 143830 4cb625ed09c696bbbd7e4c8ab3e1a0de http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 51758 fc9f6eaf17a82cb10fef0e946e5e8c69 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 53182 68791aae59f996a1b63d370455564243 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 131598 c83d5b2c8672d64225664c0dfa59bf05 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 139174 7e4ca011696d4606795423eaef77a801 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 288316 5ad389052046deb622f8a4ecc06acc1e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 290684 7a44cec77a36726791bd95cc9c3d61da http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 103540 84f9dd4e0da64b60d505ff32213de564 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 106734 30e33868fef929c1ae9ada34a904612a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 1737886 bb16ec7525631c14034ab29a062ef924 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 1803410 fa07a7b1af1f688576600e39a77d118b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-386_2.6.17.1-12.39_i386.deb Size/MD5: 912538 58e42b87cdb686e3b1a001a5c9d00266 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-generic_2.6.17.1-12.39_i386.deb Size/MD5: 917330 2a79321df3ffa0421730b1d13fdcb2e0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server-bigiron_2.6.17.1-12.39_i386.deb Size/MD5: 921050 cd0b834735573718dc588e33771fc69e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server_2.6.17.1-12.39_i386.deb Size/MD5: 917220 00bf54643d92b3126916e1389b62b9a8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_i386.deb Size/MD5: 7424710 152c4c37eeea537c091d3fbaa6ff1a19 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-386_2.6.17.1-12.39_i386.deb Size/MD5: 22850908 896bff490260d2a0a2d1c63587573776 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-generic_2.6.17.1-12.39_i386.deb Size/MD5: 22987088 7532ee46289f43572de6af13d76c8122 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server-bigiron_2.6.17.1-12.39_i386.deb Size/MD5: 23794716 399fc0c6f4d45108ad848dee3aeb8526 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server_2.6.17.1-12.39_i386.deb Size/MD5: 23294984 54c7e00442278882a2b5a27a9fc8a4e1 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-386_2.6.17.1-12.39_i386.deb Size/MD5: 1961664 54e96b54c3d01492e0defd53212da69c http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-generic_2.6.17.1-12.39_i386.deb Size/MD5: 2029428 dc8fd23f7eacf60b79458d980c0be8ce http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server-bigiron_2.6.17.1-12.39_i386.deb Size/MD5: 2067220 8d62edb94a89bb94b9c3ae0c678afdfe http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server_2.6.17.1-12.39_i386.deb Size/MD5: 2029160 deca25a0d751c2907ec756efed4e818f http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.17/linux-image-kdump_2.6.17.1-12.39_i386.deb Size/MD5: 21530894 3b57d3f94af90d5f1c1a3cc26910922b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_i386.deb Size/MD5: 1771222 71c763e96fa18da947dc6eee6273f996 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 15370 10cfc18907f69359d1bdbf2f78d26d08 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 15736 35362bfbf692db23fa6ce4701fec17f0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 253308 26b726d039e835abbd7b1b7f2505b15b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 263850 5dab11c3c728f078b7af1a07db1bee55 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 220370 f17526b4a1d385552171a60962087c12 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 227608 d7e47e9512916d938c43e591b43b0ace http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 1048352 6c6c9c78e73ec9f7971fe63cf49b8c16 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 1048472 d07c2b1c54c9edac2e5a975832e1276b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 2092200 94b08a57d9befd744d4a7dd984c46832 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 2142860 1823a89cdaa80f133c3042ef6027906d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 156874 8252c3c9f39252cee290205f86f3eac5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 152152 3445e3338b9c17bcb43bb4a910f56948 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 9180 b266fb5d5b4f747c79c34543d2edcbde http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 9658 e855025e195c2f8f173fae055a249a3f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 79224 b9faa2fe32fb6615b36cb5d771d195fb http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 81764 22a1775183f30e2af51c6422d7b0ffd7 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 55084 f8b386e3cf4128da93fdc168172b931d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 56734 4642732b2d53ec2974622eab1be5b036 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 34484 ae3b8321a6c2e72ce1d73aaeb51a290b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 35412 5a130ce6dd2a832191ecb3c06a936fda http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 85866 9a4364e45eb252c42c8467b5aac3238f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 87432 b52be9db245f990905b0d9ebc6dd57c7 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 6084 dcf193961a372c692a2eae91b3f632f9 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 6096 99a48360f55afe690f9473e34b6f1799 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 8608 9ec3749db2fb4fe85b772cb565ad04ee http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 8902 5cf288f11f076cf4493acb3462185a19 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 52684 b9d4b121f3ae3f4e9a59e8ef6db2cdb6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 55112 72dba23de6f18debf662694afd1c86ca http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 129982 3cf698040f21e94ef38da5245d398564 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 132968 6da10555d56c7a4e80b59b90af9829ee http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 99866 7f593b5372383a266557d38d6ef879d8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 101174 3b572152c1463d1515c31a73f990d2a3 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 79568 d5b9488f8e66089a93368f970d7c9aea http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 80934 ba31c0d5c7ee98e076e9e3044dd8dac3 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 1394930 8f0491b599a89d26ae8fdda93cf47535 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 1398114 9f7edf4e56a5a5363458792fbe1832e2 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 69148 7be68924e4c4e55ffc329ba1b30e7482 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 71082 3e9618027770b0bcc5ad955e3809081c http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 11422 450542ce7fbcd5144c8ee376fc9d38ec http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 11980 f2779c8454730ccb72358ccca660e0d6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 62478 51c02138465bcc89c68c9701b275c5dd http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 63808 eeaf8f81dfe946df62111a7ea8cbdc9e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 36008 ef4b454375feece71b44259e2a20d752 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 36522 194f8344fe8660a789069cfbb99b4369 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 127288 4eb7f58f56d296423a57d6f7a562bf96 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 131320 cca3b2c3fcb5bc7f991af37e1a7f7a1d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 46806 9f859879ca4e693a42f4da083661ba0c http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 47566 6fc3e9a1e7766bbca3bc5489258d56e4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb Size/MD5: 311902 3f6da4553365c0d510f4556510396b72 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb Size/MD5: 318658 d5c418b0d20538a0cd7aafb8ec1aa0b2 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 23240 66f5bf514de994d84915d882d5a611f8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 26082 6be2f4d3f90adba4e6d98973677b2190 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 48586 53fd8c1845bfdcbb7e5e29b107a276c0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 52034 603d87b3bbd90eba2f634ab2a9618972 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2320 e219fa60c226159fc90d6df2804347f4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2514 e1a6b95c138f84b6a50230c459e371eb http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 39142 8a31b03d64d142dc174f29ddfd6469e8 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 43164 c6812e8fc74cc275abbf1ad8923cd95f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 111464 7687c500326dd4c20331762277160582 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 122272 b554f0b20dcd0ebfce5ca985dd15a52e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 40406 f65f76d5ff504a1e7126489858150a81 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 46878 9c14a66ff520fb173f2ec3541627f65b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 28064 8c8f4414d68106d96c0cb147375beac4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 29046 7528aa197e90533bc51c5a2faac3188d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 209724 a8697532cb81b2eb1601bcb57f398109 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 225682 0d1c7a72f611eec4e336faac7dd9893d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 44588 8ee2bf4db312823e9e19fc0701170839 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 40180 af520f3f82ae6373ecf050f6a0515bc6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fs-common-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 1960 430d783ddeaa411aa03723cb931f03a0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fs-common-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2232 a4ada90e401800c697cc60b0e396e932 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/hfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 79296 02e167b7c3776269d66103ca8e2d62d6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/hfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 86612 82fb17eba860416a510aa5d7b050c784 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 110262 c7dc1577ba7760981d7db9598a40137d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 127800 53fbdb953cb85dede0a7e264330927cc http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 55672 be221f80a184537ce3a0f2fa02b6824a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 61924 0ea661a0734d702381f0903e4296c237 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 141124 47ad113d4a43d19a08b81576ad604089 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 158556 5202300b269311ce4714754eff59efad http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 314556 391adbaa26d02a6890c6b28aef0020fd http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 289916 4f5665cc6d901f0d2d7fd35f3db4e615 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 113204 86bd467218a4316dde6d8e2960f4ca9d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 116436 2b0ea85fd8ec23b7d8a7b626e7347d27 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2052172 da6d033827867bd628c714edff14a8b9 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2771818 3c384239bea32e48f696d7d30f847746 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc-smp_2.6.17.1-12.39_powerpc.deb Size/MD5: 915864 d03bcf64df6e31149bd4b019ed60deb2 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc64-smp_2.6.17.1-12.39_powerpc.deb Size/MD5: 920336 2162b15d8aea5ee373c22c874a22526b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc_2.6.17.1-12.39_powerpc.deb Size/MD5: 917858 516bcad3769297d3eef7f6d607bf35a5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_powerpc.deb Size/MD5: 7445094 549c0326666219ba0086efade9610992 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc-smp_2.6.17.1-12.39_powerpc.deb Size/MD5: 22719040 66394a300073c7ba74ef5c80d8bb65d0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc64-smp_2.6.17.1-12.39_powerpc.deb Size/MD5: 24606070 ec3fa905f30188ea9e833087c913f7af http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc_2.6.17.1-12.39_powerpc.deb Size/MD5: 22427416 80377ed086d753ab3c77f7a402fea432 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc-smp_2.6.17.1-12.39_powerpc.deb Size/MD5: 2042736 accb89985e59b51a14a26a2bbf0c2beb http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc64-smp_2.6.17.1-12.39_powerpc.deb Size/MD5: 2589636 3113e56b1500407f0395c4997cbb2fc0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc_2.6.17.1-12.39_powerpc.deb Size/MD5: 1969034 689cc515c3fe9b9dd65c6340fb7122ea http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_powerpc.deb Size/MD5: 1729872 c6ee6d64e4fcdc422c24a20f756140a5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 17430 091a6b837b4f03a4e01d085d382aa5b0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 17360 d81498196e5cc7ec40c6fcae5e0f8b57 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 258062 7cdc8ec029091506a1b39475c252e4dc http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 297904 bbb079ce725c0f5b5db736c2e034ac9a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 239038 6144f028649a23faf13a4b4611c811e9 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 266536 19c8662f8f7ee669e3f618cbc68b4fd5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 1048448 2d219f4cc488a3a5de3534fcc003b4c3 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 1048588 65293d6fcac990bda20e84635efa96aa http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2098394 4fecae0ee0d1ad474f2e9b440bb50c76 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 2331766 fe68e08970accf65a0d5106e639f87ea http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 233858 fbd8ae40c9e092e8f6ef3ef89b5fa034 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 214704 d1c180af3cee5d80a0c6e045ab7cca66 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 12696 46e06747d49b64cce513633b79b00111 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 13316 61b3b6a0c84695365661f6ea8697d7f0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 83240 0dc567f9c97d271aebe807ec017454a4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 97162 85d44740ed633723dac4810b60a4941a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 71160 cc8f7ddf940a1dc28540b951d600494a http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 84188 7c3bcdb3c9f430a83fe217c3f608e987 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 6346 501b4f81087de783cb047beccd821e16 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 6890 3fc743c702743c64626afb149611772e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 57002 13f8831879808c97eff7bd30fac4ffd9 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 69202 ab86b925064cd257a09f4c0b18ecfcc5 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 128618 15deac4a700effc177eb788d2ab7a483 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 156242 50b0643e2ed32e9155272f20acd92379 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 109764 5e9925bddb96efdb84a8c719c4815495 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 133040 aecf93580b62a1b25e346595c0a232e0 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 86612 20f2a685e18d0ad56f8d34d0343d921e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 94826 01743e049cfef3843e781189aa3d1497 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 1511478 4660787ea1a93756c0c0dd869c221023 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 1521588 d70e9fa47808f171ac95c169c6e29177 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 101306 c55cc8f4ff26c9e82f2f3ebf3b81388c http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 115560 37bdd2239d7c633267fe0441ed93f988 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 12206 36f00173ddd7427b7540f81a56503c1d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 14294 c4c8a72bc8944313aac2200cc04e97ae http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 84678 1dd8aa1c4555a8459dae275aaac03aa9 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 87956 19bca79086e039ba65e5a72d8d359f75 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 37278 c2bd19dca9c56862aa93460ccb8751ae http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 40252 1483517a7607b74fa6fcbcc22ab5fdd6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 139996 26c86dc67c3a654d8f1ec87ffa2fca28 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 161492 ebe28ec47f8f488e2235d7913a02d046 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 49996 ec1ed33de95bdb1c37aa9a9bd34bd69f http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 54876 7e9284172eac7124fa71724d66d1b636 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 308218 7f86cf616bb7ab1db75697f678ea6acd http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb Size/MD5: 330232 403f447d858dbe8c55c33563b7cf1eb5 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 50734 bb2efbe1b281982ecde5580ab6fe3b50 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 2388 5b3124294cced1f9c01bef0f54b3e6be http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 40670 d5285a397b2cfbfa99b5c31547a1630d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 112228 228400863e74dde11225e875b61afc14 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 41754 fc6f0b3e063713229519155b8084a67d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 105100 b9ea17239e0badbbebcccd6fbc32e802 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 6860 3fb7358ac5a7381d52295f06bc623ab7 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 147570 fa000eaaca4c2d10302b5a0d2bc69cb4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 1840714 1842940403b8e2e931a44eb01359bfe6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-sparc64-smp_2.6.17.1-12.39_sparc.deb Size/MD5: 812940 f9a5e0636476d16cec2229e413043766 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-sparc64_2.6.17.1-12.39_sparc.deb Size/MD5: 808176 2b5aebefa48c28a7c5d4209aab7033cb http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_sparc.deb Size/MD5: 7424164 c74ba68d7311108b74006d980dd10dde http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-sparc64-smp_2.6.17.1-12.39_sparc.deb Size/MD5: 15626704 1e4b8d0931b65f611d65703b0ec0f36e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-sparc64_2.6.17.1-12.39_sparc.deb Size/MD5: 15290014 3a50dbd38c7755fe3ff318b060cc1220 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-sparc64-smp_2.6.17.1-12.39_sparc.deb Size/MD5: 2172050 ba0f7981b554898adfc969fb69ccf64b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-sparc64_2.6.17.1-12.39_sparc.deb Size/MD5: 2086206 09f393da6d5146f7dce916f54f3d7691 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_sparc.deb Size/MD5: 1813150 e3b3905635f967a48624137edcdbb27b http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 7404 ea3a9c628a0abb24538ddbe64f19492e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 263986 2619285b2ab85918a65c1e23aac157b4 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 229210 dc1d9b2fd9a2bb983a928a1c901232cf http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 1048450 a8621025ef6733f91c55ac4faca6e969 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 1922014 0d453425af2422b8cdbf51befa1549c1 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 9916 70e259e5700fbdb85527cded08f64ed6 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 40360 789d5ef17ef193756a42a6b9fc0aa33d http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 8718 501c7f5bdcbfa3d4cee868f09173ccc3 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 59388 36b36d79b6c3ac4ae081211a23ceb9bb http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 162874 6a197706de5114d0fab66cae0bd63ffc http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 66650 89d73eaf9ae8e6cf12ef9eb419bcec66 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 855816 f89556200a52867a2c1a02d2ca43ac99 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 51828 f226534e06e281c35a9c46e7fc163f2e http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 38424 9896fecebac71aa51c4770188e89a9b2 http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb Size/MD5: 283108 4ef6014b80d06c5db64affc1b671ee8a . Details follow: A buffer overflow was discovered in the Moxa serial driver. A local user could manipulate this to send signals to processes they would not normally have access to. The nf_conntrack function in netfilter did not set nfctinfo during reassembly of fragmented packets, which left the default value as IP_CT_ESTABLISHED and could allow remote attackers to bypass certain rulesets using IPv6 fragments (CVE-2007-1497). A typo in the Linux kernel caused RTA_MAX to be used as an array size instead of RTN_MAX, which lead to an out of bounds access by certain functions (CVE-2007-2172). A stack-based buffer overflow in the random number generator could allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size (CVE-2007-3105). The Linux kernel allowed local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die which delivered an attacker-controlled parent process death signal (PR_SET_PDEATHSIG) (CVE-2007-3848). The IA32 system call emulation functionality, when running on the x86_64 architecture, did not zero extend the eax register after the 32bit entry path to ptrace is used, which could allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register (CVE-2007-4573). In addition to these security fixes, other fixes have been included such as: - The 3w-9xxx module was updated to version 9.4.1.2, adding support for 9650SE - Fixed the build of e1000-ng - Added NIC support for MCP55 - Added LSI Logic MegaRAID SAS 8300XLP support To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1497 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2453 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2525 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2875 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2876 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3105 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573 _______________________________________________________________________ Updated Packages: Corporate 4.0: 3657c208eeb3c079d9ff0a4ca55a9b03 corporate/4.0/i586/kernel-2.6.12.32mdk-1-1mdk.i586.rpm 0cd8fd1c504f3365fe503c4fd627b6ea corporate/4.0/i586/kernel-BOOT-2.6.12.32mdk-1-1mdk.i586.rpm fbabe3497810452a0052bc67a5fb4f29 corporate/4.0/i586/kernel-doc-2.6.12.32mdk-1-1mdk.i586.rpm 02edfc1bbb2bd826c4a9152d670cc2cc corporate/4.0/i586/kernel-i586-up-1GB-2.6.12.32mdk-1-1mdk.i586.rpm 88b0876de92beff866bb91ba57be0a70 corporate/4.0/i586/kernel-i686-up-4GB-2.6.12.32mdk-1-1mdk.i586.rpm e813926dc184e911deb62a1e34cff8ed corporate/4.0/i586/kernel-smp-2.6.12.32mdk-1-1mdk.i586.rpm a8011ebbe529551463f87cc22f3da22f corporate/4.0/i586/kernel-source-2.6.12.32mdk-1-1mdk.i586.rpm 813ba955a1e9b5ff9834aeebbe477a93 corporate/4.0/i586/kernel-source-stripped-2.6.12.32mdk-1-1mdk.i586.rpm be08ad30fbc3988f654c1532e73fc330 corporate/4.0/i586/kernel-xbox-2.6.12.32mdk-1-1mdk.i586.rpm 5894ac0216cf38203d2002a19db70c15 corporate/4.0/i586/kernel-xen0-2.6.12.32mdk-1-1mdk.i586.rpm 62d5b93083df571edbf8785bc754dd6e corporate/4.0/i586/kernel-xenU-2.6.12.32mdk-1-1mdk.i586.rpm 423fe3296a56ff845fd643890663cdee corporate/4.0/SRPMS/kernel-2.6.12.32mdk-1-1mdk.src.rpm Corporate 4.0/X86_64: a51bd78ce00e65f7521625c8c67605f0 corporate/4.0/x86_64/kernel-2.6.12.32mdk-1-1mdk.x86_64.rpm 8d407ed81be714537c2c957918cedfed corporate/4.0/x86_64/kernel-BOOT-2.6.12.32mdk-1-1mdk.x86_64.rpm 730c0bae9b443e5f9d8cb3c8a3486488 corporate/4.0/x86_64/kernel-doc-2.6.12.32mdk-1-1mdk.x86_64.rpm 06391bd475945e8a8b76dcb33989fc83 corporate/4.0/x86_64/kernel-smp-2.6.12.32mdk-1-1mdk.x86_64.rpm bc9c9a881f18b5c2f892684aaeee84cf corporate/4.0/x86_64/kernel-source-2.6.12.32mdk-1-1mdk.x86_64.rpm b0240b751985babe1aabda9c9e231a92 corporate/4.0/x86_64/kernel-source-stripped-2.6.12.32mdk-1-1mdk.x86_64.rpm b1b4750de7daf9cb12ed0057a8851f32 corporate/4.0/x86_64/kernel-xen0-2.6.12.32mdk-1-1mdk.x86_64.rpm 915a8eb87a9fc0c0deab5e696f27c59b corporate/4.0/x86_64/kernel-xenU-2.6.12.32mdk-1-1mdk.x86_64.rpm 423fe3296a56ff845fd643890663cdee corporate/4.0/SRPMS/kernel-2.6.12.32mdk-1-1mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFHE+PimqjQ0CJFipgRAprEAKCoEfNhoDZrxQng2IYqYumR/3zVvACeOoJQ 51R6ymKyEZNBb9xnSWE/E64= =QWz7 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.15

sources: NVD: CVE-2007-2242 // CERT/CC: VU#267289 // JVNDB: JVNDB-2007-000387 // BID: 23615 // PACKETSTORM: 60879 // PACKETSTORM: 56342 // PACKETSTORM: 57864 // PACKETSTORM: 58999 // PACKETSTORM: 58920 // PACKETSTORM: 60130

AFFECTED PRODUCTS

vendor:openbsdmodel:openbsdscope:eqversion:3.9

Trust: 1.7

vendor:openbsdmodel:openbsdscope:eqversion:4.0

Trust: 1.7

vendor:freebsdmodel:freebsdscope:eqversion:6.2

Trust: 1.1

vendor:ietfmodel:ipv6scope:eqversion:*

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:fujitsumodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel: - scope: - version: -

Trust: 0.8

vendor:internet initiativemodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:rpathmodel: - scope: - version: -

Trust: 0.8

vendor:fujitsumodel:router si-r seriesscope: - version: -

Trust: 0.8

vendor:yamahamodel:rt seriesscope: - version: -

Trust: 0.8

vendor:freebsdmodel:freebsdscope:eqversion:5.5

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:hitachimodel:gs3000scope: - version: -

Trust: 0.8

vendor:freebsdmodel:freebsdscope:eqversion:6.1

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion:2.6.20.9

Trust: 0.8

vendor:internet initiativemodel:seil/neuscope:eqversion:ver.2.x 2.00 (belay) ~ 2.32 (expedition)

Trust: 0.8

vendor:hitachimodel:gs4000scope: - version: -

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f80/f100/f120/f1000

Trust: 0.8

vendor:necmodel:ix2000 seriesscope: - version: -

Trust: 0.8

vendor:hitachimodel:gr4000scope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:(ipv6 all series that support

Trust: 0.8

vendor:internet initiativemodel:seil/plusscope:eqversion:1.00 (snappy) ~ 1.80 (splash)

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion:2.6.21

Trust: 0.8

vendor:fujitsumodel:si-r70brinscope: - version: -

Trust: 0.8

vendor:internet initiativemodel:seil/neuscope:eqversion:atm 1.10 (pogo) ~ 1.42 (rubberpatch9)

Trust: 0.8

vendor:necmodel:ix1000 seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix4100 seriesscope: - version: -

Trust: 0.8

vendor:internet initiativemodel:seil/turboscope:eqversion:1.00 (union) ~ 1.80 (shiloh)

Trust: 0.8

vendor:linuxmodel:kernelscope:ltversion:version

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:necmodel:ix3000 seriesscope: - version: -

Trust: 0.8

vendor:internet initiativemodel:seil/neuscope:eqversion:ver.1.x 1.52 (inkknot) ~ 1.97 (b age13)

Trust: 0.8

vendor:hitachimodel:gr2000scope: - version: -

Trust: 0.8

vendor:susemodel:linux enterprise server 10.sp1scope: - version: -

Trust: 0.6

vendor:seilmodel:neu atmscope:eqversion:1.10

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:10

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:10.1x86

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:seilmodel:neu ver.scope:eqversion:1.x1.52

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:seilmodel:neu ver.scope:eqversion:1.x1.97

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.1

Trust: 0.3

vendor:applemodel:airport extremescope:eqversion:7.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:seilmodel:turboscope:eqversion:1.80

Trust: 0.3

vendor:susemodel:linux enterprise desktop 10.sp1scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:foresightmodel:linux foresight linuxscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:ietfmodel:rfc internet protocol versionscope:eqversion:2460-60

Trust: 0.3

vendor:susemodel:linux enterprise sp1 debuginfoscope:eqversion:10

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:seilmodel:turboscope:eqversion:1.18

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:freebsdmodel:5.4-stablescope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.10

Trust: 0.3

vendor:freebsdmodel:-release-p10scope:eqversion:6.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:seilmodel:turboscope:eqversion:1.00

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:susemodel:linux ppcscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:6.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:applemodel:airport extremescope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.0.x

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.2

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:seilmodel:neu ver.scope:eqversion:2.x2.32

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:seilmodel:neu ver.scope:eqversion:2.x2.00

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:netbsdmodel:beta2scope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.4

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:seilmodel:plusscope:eqversion:1.80

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:2.6.20.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:applemodel:airport extremescope:neversion:7.2.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:seilmodel:plusscope:eqversion:1.00

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:seilmodel:neu atmscope:eqversion:1.42

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:10.1x86-64

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:seilmodel:neu atmscope:eqversion:1.35

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0.x

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#267289 // BID: 23615 // JVNDB: JVNDB-2007-000387 // CNNVD: CNNVD-200704-492 // NVD: CVE-2007-2242

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2242
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#267289
value: 11.03

Trust: 0.8

NVD: CVE-2007-2242
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200704-492
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2007-2242
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#267289 // JVNDB: JVNDB-2007-000387 // CNNVD: CNNVD-200704-492 // NVD: CVE-2007-2242

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2242

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200704-492

TYPE

Design Error

Trust: 0.9

sources: BID: 23615 // CNNVD: CNNVD-200704-492

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000387

PATCH

title:cisco-sa-20070124-IOS-IPv6url:http://www.cisco.com/warp/public/707/cisco-sa-20070124-IOS-IPv6.shtml

Trust: 0.8

title:IPv6プロトコルのType 0ルーティングヘッダに関する脆弱性についてurl:http://www.furukawa.co.jp/fitelnet/topic/vulnera_20070614.html

Trust: 0.8

title:FreeBSD-SA-07:03.ipv6url:http://security.freebsd.org/advisories/FreeBSD-SA-07:03.ipv6.asc

Trust: 0.8

title:日立株式会社からの情報url:http://jvn.jp/cert/JVNVU%23267289/066287/index.html

Trust: 0.8

title:ChangeLog-2.6.20.9url:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.9

Trust: 0.8

title:ChangeLog-2.6.21url:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21

Trust: 0.8

title:NV07-001url:http://www.nec.co.jp/security-info/secinfo/nv07-001.html

Trust: 0.8

title:022: SECURITY FIX: April 23, 2007url:http://openbsd.org/errata39.html#022_route6

Trust: 0.8

title:012: SECURITY FIX: April 23, 2007url:http://openbsd.org/errata40.html#012_route6

Trust: 0.8

title:RHSA-2007:0347url:https://rhn.redhat.com/errata/RHSA-2007-0347.html

Trust: 0.8

title:タイプ0のルーティングヘッダが付いたIPv6がDoS攻撃に使われる可能性のある脆弱性についてurl:http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU267289.html

Trust: 0.8

title:[影響:あり] IPv6プロトコル仕様の脆弱性url:http://www.seil.jp/seilseries/news/snote/snote_200705_01.html

Trust: 0.8

title:cisco-sa-20070124-IOS-IPv6url:http://www.cisco.com/cisco/web/support/JP/102/1021/1021604_cisco-sa-20070124-IOS-IPv6-j.html

Trust: 0.8

title:IPv6拡張ヘッダのType0 ルーティングヘッダに関する脆弱性についてurl:http://www.allied-telesis.co.jp/support/list/faq/vuls/20071025.html

Trust: 0.8

title:RHSA-2007:0347url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0347J.html

Trust: 0.8

title:ルータ(Si-Rシリーズ,Si-R70brin)のIPv6プロトコル実装に起因する脆弱性への対応についてurl:http://fenics.fujitsu.com/products/support/2007/sir_07.html

Trust: 0.8

title:VU#267289url:http://software.fujitsu.com/jp/security/vulnerabilities/vu267289.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000387

EXTERNAL IDS

db:CERT/CCid:VU#267289

Trust: 3.5

db:NVDid:CVE-2007-2242

Trust: 3.3

db:SECUNIAid:25068

Trust: 3.2

db:BIDid:23615

Trust: 2.7

db:SECUNIAid:24978

Trust: 2.4

db:SECUNIAid:26703

Trust: 2.4

db:SECUNIAid:25033

Trust: 2.4

db:SECUNIAid:25770

Trust: 2.4

db:VUPENid:ADV-2007-3050

Trust: 1.6

db:VUPENid:ADV-2007-1563

Trust: 1.6

db:VUPENid:ADV-2007-2270

Trust: 1.6

db:SECUNIAid:25083

Trust: 1.6

db:SECUNIAid:26133

Trust: 1.6

db:SECUNIAid:26664

Trust: 1.6

db:SECUNIAid:25288

Trust: 1.6

db:SECUNIAid:26651

Trust: 1.6

db:SECUNIAid:28806

Trust: 1.6

db:SECUNIAid:25691

Trust: 1.6

db:SECUNIAid:26620

Trust: 1.6

db:SECTRACKid:1017949

Trust: 1.6

db:XFid:33851

Trust: 1.4

db:JVNDBid:JVNDB-2007-000387

Trust: 0.8

db:MANDRIVAid:MDKSA-2007:171

Trust: 0.6

db:MANDRIVAid:MDKSA-2007:196

Trust: 0.6

db:MANDRIVAid:MDKSA-2007:216

Trust: 0.6

db:OPENBSDid:[4.0] 20070423 012: SECURITY FIX: APRIL 23, 2007

Trust: 0.6

db:OPENBSDid:[3.9] 20070423 022: SECURITY FIX: APRIL 23, 2007

Trust: 0.6

db:UBUNTUid:USN-508-1

Trust: 0.6

db:UBUNTUid:USN-486-1

Trust: 0.6

db:BUGTRAQid:20070615 RPSA-2007-0124-1 KERNEL XEN

Trust: 0.6

db:BUGTRAQid:20070508 FLEA-2007-0016-1: KERNEL

Trust: 0.6

db:REDHATid:RHSA-2007:0347

Trust: 0.6

db:FREEBSDid:FREEBSD-SA-07:03.IPV6

Trust: 0.6

db:XFid:6

Trust: 0.6

db:SUSEid:SUSE-SA:2008:006

Trust: 0.6

db:SUSEid:SUSE-SA:2007:051

Trust: 0.6

db:CNNVDid:CNNVD-200704-492

Trust: 0.6

db:PACKETSTORMid:60879

Trust: 0.1

db:PACKETSTORMid:56342

Trust: 0.1

db:PACKETSTORMid:57864

Trust: 0.1

db:PACKETSTORMid:58999

Trust: 0.1

db:PACKETSTORMid:58920

Trust: 0.1

db:PACKETSTORMid:60130

Trust: 0.1

sources: CERT/CC: VU#267289 // BID: 23615 // JVNDB: JVNDB-2007-000387 // PACKETSTORM: 60879 // PACKETSTORM: 56342 // PACKETSTORM: 57864 // PACKETSTORM: 58999 // PACKETSTORM: 58920 // PACKETSTORM: 60130 // CNNVD: CNNVD-200704-492 // NVD: CVE-2007-2242

REFERENCES

url:http://www.kb.cert.org/vuls/id/267289

Trust: 2.7

url:http://openbsd.org/errata40.html#012_route6

Trust: 2.4

url:http://docs.info.apple.com/article.html?artnum=305712

Trust: 2.4

url:http://secunia.com/advisories/25068

Trust: 2.4

url:http://www.securityfocus.com/bid/23615

Trust: 2.4

url:http://www.secdev.org/conf/ipv6_rh_security-csw07.pdf

Trust: 2.0

url:http://security.freebsd.org/advisories/freebsd-sa-07:03.ipv6.asc

Trust: 1.7

url:http://secunia.com/advisories/24978

Trust: 1.6

url:http://openbsd.org/errata39.html#022_route6

Trust: 1.6

url:https://issues.rpath.com/browse/rpl-1310

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-508-1

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-486-1

Trust: 1.6

url:http://www.securitytracker.com/id?1017949

Trust: 1.6

url:http://www.securityfocus.com/archive/1/471457

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2007-0347.html

Trust: 1.6

url:http://www.novell.com/linux/security/advisories/2007_51_kernel.html

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2007:216

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2007:196

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2007:171

Trust: 1.6

url:http://secunia.com/advisories/28806

Trust: 1.6

url:http://secunia.com/advisories/26703

Trust: 1.6

url:http://secunia.com/advisories/26664

Trust: 1.6

url:http://secunia.com/advisories/26651

Trust: 1.6

url:http://secunia.com/advisories/26620

Trust: 1.6

url:http://secunia.com/advisories/26133

Trust: 1.6

url:http://secunia.com/advisories/25770

Trust: 1.6

url:http://secunia.com/advisories/25691

Trust: 1.6

url:http://secunia.com/advisories/25288

Trust: 1.6

url:http://secunia.com/advisories/25083

Trust: 1.6

url:http://secunia.com/advisories/25033

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html

Trust: 1.6

url:http://docs.info.apple.com/article.html?artnum=306375

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2007/1563

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/33851

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2242

Trust: 1.2

url:http://www.vupen.com/english/advisories/2007/1563

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2270

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/3050

Trust: 1.0

url:http://www.securityfocus.com/archive/1/467939/30/6690/threaded

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9574

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/33851

Trust: 1.0

url:http://secunia.com/advisories/24978/

Trust: 0.8

url:http://secunia.com/advisories/25033/

Trust: 0.8

url:http://www.secdev.org/conf/ipv6_rh_security-csw07.pdf

Trust: 0.8

url:http://secunia.com/advisories/25068/

Trust: 0.8

url:http://www.ietf.org/rfc/rfc2460.txt

Trust: 0.8

url:http://secunia.com/advisories/25770/

Trust: 0.8

url:http://secunia.com/advisories/26703/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23267289/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2242

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2007-2242

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/467939/30/6690/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/3050

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2270

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2007-2453

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2007-2525

Trust: 0.4

url:http://blogs.sun.com/security/entry/ipv6_routing_header_issues

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20070124-ios-ipv6.shtml

Trust: 0.3

url:http://www1.ietf.org/mail-archive/web/ipv6/current/msg07499.html

Trust: 0.3

url:http://www.freebsd.org/

Trust: 0.3

url:http://www.kernel.org/pub/linux/kernel/v2.6/changelog-2.6.20.9

Trust: 0.3

url:http://www.netbsd.org/

Trust: 0.3

url:http://www.openbsd.org

Trust: 0.3

url:http://www.apple.com/support/downloads/airportextremebasestationwith80211nfirmware721.html

Trust: 0.3

url:http://www.ipv6.org/

Trust: 0.3

url:http://www.seil.jp/en/news/snote/snote_200705_01_en.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0347.html

Trust: 0.3

url:http://support.novell.com/techcenter/psdb/a4e6d19f94707022b621550d1049f74e.html

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2525

Trust: 0.3

url:http://www.mandriva.com/security/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3105

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2172

Trust: 0.3

url:http://www.mandriva.com/en/security/kernelupdate

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-2172

Trust: 0.3

url:http://www.mandriva.com/security/advisories

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2453

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-2876

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-7203

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-2875

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3105

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-1861

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-4308

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-3848

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-1497

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1497

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-7203

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2876

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2875

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-4133

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4133

Trust: 0.1

url:http://security.freebsd.org/patches/sa-07:03/ipv6.patch.asc

Trust: 0.1

url:http://www.freebsd.org/handbook/kernelconfig.html>

Trust: 0.1

url:http://security.freebsd.org/patches/sa-07:03/ipv6.patch

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-generic_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-386_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc-smp_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc64-smp_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-sparc64-smp_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-generic_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-generic_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc-smp_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc-smp_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc64-smp_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.39.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-generic_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/hfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fs-common-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-sparc64_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-1353

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0005

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.39.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.39_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-sparc64_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-doc-2.6.17_2.6.17.1-12.39_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-sparc64_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.17/linux-image-kdump_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-1000

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc64-smp_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fs-common-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-sparc64-smp_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-sparc64-smp_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-generic_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server-bigiron_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-kernel-devel_2.6.17.1-12.39_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server-bigiron_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-386_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server-bigiron_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-generic_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2878

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/hfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-sparc64-di_2.6.17.1-12.39_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.39_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-386-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-386_2.6.17.1-12.39_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-generic-di_2.6.17.1-12.39_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.39_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-generic-di_2.6.17.1-12.39_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-amd64-generic_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-powerpc-smp_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-k7_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-686_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-powerpc_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-server-bigiron_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-sparc64-smp_2.6.15-29.58_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-29.58_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-29.58_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-amd64-server_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-k7_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-686_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29_2.6.15-29.58_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-server_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-amd64-k8_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-386_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-amd64-generic_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-29.58.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-powerpc64-smp_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-powerpc64-smp_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-sparc64-smp_2.6.15-29.58_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-sparc64_2.6.15-29.58_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-amd64-server_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-amd64-xeon_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-sparc64_2.6.15-29.58_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-powerpc-smp_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-386_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-29.58.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-powerpc_2.6.15-29.58_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-29.58_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3104

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-29-server_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-amd64-k8_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-0504

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-server-bigiron_2.6.15-29.58_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-29-amd64-xeon_2.6.15-29.58_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-29-powerpc-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-29-sparc64-di_2.6.15-29.58_sparc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-29-amd64-generic-di_2.6.15-29.58_amd64.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-29-386-di_2.6.15-29.58_i386.udeb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-29-powerpc64-smp-di_2.6.15-29.58_powerpc.udeb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-1496

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1496

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-5755

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5755

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1861

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4573

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3513

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4308

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4573

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3848

Trust: 0.1

sources: CERT/CC: VU#267289 // BID: 23615 // JVNDB: JVNDB-2007-000387 // PACKETSTORM: 60879 // PACKETSTORM: 56342 // PACKETSTORM: 57864 // PACKETSTORM: 58999 // PACKETSTORM: 58920 // PACKETSTORM: 60130 // CNNVD: CNNVD-200704-492 // NVD: CVE-2007-2242

CREDITS

Philippe Biondi biondi@cartel-securite.fr

Trust: 0.6

sources: CNNVD: CNNVD-200704-492

SOURCES

db:CERT/CCid:VU#267289
db:BIDid:23615
db:JVNDBid:JVNDB-2007-000387
db:PACKETSTORMid:60879
db:PACKETSTORMid:56342
db:PACKETSTORMid:57864
db:PACKETSTORMid:58999
db:PACKETSTORMid:58920
db:PACKETSTORMid:60130
db:CNNVDid:CNNVD-200704-492
db:NVDid:CVE-2007-2242

LAST UPDATE DATE

2024-12-21T20:46:45.276000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#267289date:2011-07-22T00:00:00
db:BIDid:23615date:2008-02-08T14:46:00
db:JVNDBid:JVNDB-2007-000387date:2007-11-02T00:00:00
db:CNNVDid:CNNVD-200704-492date:2007-04-26T00:00:00
db:NVDid:CVE-2007-2242date:2024-11-21T00:30:16.800

SOURCES RELEASE DATE

db:CERT/CCid:VU#267289date:2007-06-01T00:00:00
db:BIDid:23615date:2007-04-23T00:00:00
db:JVNDBid:JVNDB-2007-000387date:2007-06-01T00:00:00
db:PACKETSTORMid:60879date:2007-11-14T02:03:01
db:PACKETSTORMid:56342date:2007-05-03T00:13:35
db:PACKETSTORMid:57864date:2007-07-19T05:10:35
db:PACKETSTORMid:58999date:2007-09-01T03:53:01
db:PACKETSTORMid:58920date:2007-08-29T04:36:35
db:PACKETSTORMid:60130date:2007-10-16T04:22:46
db:CNNVDid:CNNVD-200704-492date:2007-04-25T00:00:00
db:NVDid:CVE-2007-2242date:2007-04-25T16:19:00