CVE-2005-2459
CVSS5.0
发布时间 :2005-08-23 00:00:00
修订时间 :2016-11-18 11:54:16
NMCOPS    

[原文]The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458.


[CNNVD]Linux Kernel ZLib本地空指针引用 拒绝服务漏洞(CNNVD-200508-258)

        Linux Kernel是开放源码操作系统Linux所使用的内核。
        Linux kernel 2.6.12.5之前版本zlib例程inflate.c的huft_build函数会返回错误的值:
        ...
         336 if (c[0] == n) /* null input--all zero length codes */
         337 {
         338 *t = (struct huft *)NULL;
         339 *m = 0;
         340 return 0;
         341 }
        ...
        这允许远程攻击者通过某些可能导致空指针应用的压缩文件导致拒绝服务(kernel崩溃)。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-476 [空指针解引用]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.8.1.5::power4
cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc
cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8_smp
cpe:/o:linux:linux_kernel:2.6.9:2.6.20
cpe:/o:linux:linux_kernel:2.6.8.1.5::power3
cpe:/o:linux:linux_kernel:2.6.8:rc2Linux Kernel 2.6.8 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.4Linux Kernel 2.6.11.4
cpe:/o:linux:linux_kernel:2.6.11.5Linux Kernel 2.6.11.5
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.2Linux Kernel 2.6.11.2
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.3Linux Kernel 2.6.11.3
cpe:/o:linux:linux_kernel:2.6.11.8Linux Kernel 2.6.11.8
cpe:/o:linux:linux_kernel:2.6.11.6Linux Kernel 2.6.11.6
cpe:/o:linux:linux_kernel:2.6.11.7Linux Kernel 2.6.11.7
cpe:/o:linux:linux_kernel:2.6.0:test1Linux Kernel 2.6 test1
cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc_smp
cpe:/o:linux:linux_kernel:2.6.8.1.5::386
cpe:/o:linux:linux_kernel:2.6.11_rc1_bk6
cpe:/o:linux:linux_kernel:2.6.8.1.5::686_smp
cpe:/o:linux:linux_kernel:2.6.8:rc1Linux Kernel 2.6.8 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.8:rc3Linux Kernel 2.6.8 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.8.1.5::k7_smp
cpe:/o:debian:debian_linux:3.1Debian Debian Linux 3.1
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64
cpe:/o:linux:linux_kernel:2.6.8.1Linux Kernel 2.6.8.1
cpe:/o:linux:linux_kernel:2.6.11:rc4Linux Kernel 2.6.11 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.12:rc1Linux Kernel 2.6.12 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.8.1.5
cpe:/o:linux:linux_kernel:2.6.11:rc3Linux Kernel 2.6.11 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12:rc4Linux Kernel 2.6.12 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.6.8.1.5::power4_smp
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.0:test5Linux Kernel 2.6 test5
cpe:/o:linux:linux_kernel:2.6.0:test2Linux Kernel 2.6 test2
cpe:/o:linux:linux_kernel:2.6.0:test4Linux Kernel 2.6 test4
cpe:/o:linux:linux_kernel:2.6.0:test9Linux Kernel 2.6 test9
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.0:test6Linux Kernel 2.6 test6
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8
cpe:/o:linux:linux_kernel:2.6.0:test3Linux Kernel 2.6 test3
cpe:/o:linux:linux_kernel:2.6.0:test8Linux Kernel 2.6 test8
cpe:/o:linux:linux_kernel:2.6.11:rc2Linux Kernel 2.6.11 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_xeon
cpe:/o:linux:linux_kernel:2.6_test9_cvs
cpe:/o:linux:linux_kernel:2.6.8.1.5::k7
cpe:/o:linux:linux_kernel:2.6.0:test7Linux Kernel 2.6 test7
cpe:/o:linux:linux_kernel:2.6.10:rc2Linux Kernel 2.6.10 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.0:test11Linux Kernel 2.6 test11
cpe:/o:linux:linux_kernel:2.6.11.1Linux Kernel 2.6.11.1
cpe:/o:linux:linux_kernel:2.6.0:test10Linux Kernel 2.6 test10
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.8.1.5::power3_smp
cpe:/o:linux:linux_kernel:2.6.8.1.5::686

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2459
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-258
(官方数据源) CNNVD

- 其它链接及资源

http://bugs.gentoo.org/show_bug.cgi?id=94584
(VENDOR_ADVISORY)  MISC  http://bugs.gentoo.org/show_bug.cgi?id=94584
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5
(VENDOR_ADVISORY)  CONFIRM  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5
http://www.debian.org/security/2005/dsa-921
(VENDOR_ADVISORY)  DEBIAN  DSA-921
http://www.debian.org/security/2005/dsa-922
(VENDOR_ADVISORY)  DEBIAN  DSA-922
http://www.novell.com/linux/security/advisories/2005_50_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2005:050
http://www.securityfocus.com/archive/1/archive/1/419522/100/0/threaded
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2005:068
http://www.securityfocus.com/bid/14720
(VENDOR_ADVISORY)  BID  14720
http://www.ubuntulinux.org/support/documentation/usn/usn-169-1
(UNKNOWN)  UBUNTU  USN-169-1

- 漏洞信息

Linux Kernel ZLib本地空指针引用 拒绝服务漏洞
中危 其他
2005-08-23 00:00:00 2005-10-25 00:00:00
本地  
        Linux Kernel是开放源码操作系统Linux所使用的内核。
        Linux kernel 2.6.12.5之前版本zlib例程inflate.c的huft_build函数会返回错误的值:
        ...
         336 if (c[0] == n) /* null input--all zero length codes */
         337 {
         338 *t = (struct huft *)NULL;
         339 *m = 0;
         340 return 0;
         341 }
        ...
        这允许远程攻击者通过某些可能导致空指针应用的压缩文件导致拒绝服务(kernel崩溃)。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.5.tar.gz

- 漏洞信息 (F39524)

Ubuntu Security Notice 169-1 (PacketStormID:F39524)
2005-08-24 00:00:00
Ubuntu  ubuntu.com
advisory,kernel,vulnerability
linux,ubuntu
CVE-2005-2098,CVE-2005-2456,CVE-2005-2457,CVE-2005-2458,CVE-2005-2459,CVE-2005-2548,CVE-2005-2555
[点击下载]

Ubuntu Security Notice USN-169-1 - Ubuntu has released a kernel update for over a half dozen vulnerabilities in linux-source-2.6.10.

===========================================================
Ubuntu Security Notice USN-169-1	    August 19, 2005
linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities
CAN-2005-2098, CAN-2005-2456, CAN-2005-2457, CAN-2005-2458,
CAN-2005-2459, CAN-2005-2548, CAN-2005-2555
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:

linux-image-2.6.10-5-386
linux-image-2.6.10-5-686
linux-image-2.6.10-5-686-smp
linux-image-2.6.10-5-amd64-generic
linux-image-2.6.10-5-amd64-k8
linux-image-2.6.10-5-amd64-k8-smp
linux-image-2.6.10-5-amd64-xeon
linux-image-2.6.10-5-itanium
linux-image-2.6.10-5-itanium-smp
linux-image-2.6.10-5-k7
linux-image-2.6.10-5-k7-smp
linux-image-2.6.10-5-mckinley
linux-image-2.6.10-5-mckinley-smp
linux-image-2.6.10-5-power3
linux-image-2.6.10-5-power3-smp
linux-image-2.6.10-5-power4
linux-image-2.6.10-5-power4-smp
linux-image-2.6.10-5-powerpc
linux-image-2.6.10-5-powerpc-smp
linux-image-2.6.8.1-5-386
linux-image-2.6.8.1-5-686
linux-image-2.6.8.1-5-686-smp
linux-image-2.6.8.1-5-amd64-generic
linux-image-2.6.8.1-5-amd64-k8
linux-image-2.6.8.1-5-amd64-k8-smp
linux-image-2.6.8.1-5-amd64-xeon
linux-image-2.6.8.1-5-k7
linux-image-2.6.8.1-5-k7-smp
linux-image-2.6.8.1-5-power3
linux-image-2.6.8.1-5-power3-smp
linux-image-2.6.8.1-5-power4
linux-image-2.6.8.1-5-power4-smp
linux-image-2.6.8.1-5-powerpc
linux-image-2.6.8.1-5-powerpc-smp
linux-patch-debian-2.6.8.1
linux-patch-ubuntu-2.6.10

The problem can be corrected by upgrading the affected package to
version 2.6.8.1-16.21 (for Ubuntu 4.10), or 2.6.10-34.4 (for Ubuntu
5.04).  You need to reboot your computer after a standard system
upgrade to effect the necessary changes.

Details follow:

David Howells discovered a local Denial of Service vulnerability in
the key session joining function. Under certain user-triggerable
conditions, a semaphore was not released properly, which caused
processes which also attempted to join a key session to hang forever.
This only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)

David Howells discovered a local Denial of Service vulnerability in
the keyring allocator. A local attacker could exploit this to crash
the kernel by attempting to add a specially crafted invalid keyring.
This only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)

Balazs Scheidler discovered a local Denial of Service vulnerability in
the xfrm_compile_policy() function. By calling setsockopt() with an
invalid xfrm_user policy message, a local attacker could cause the
kernel to write to an array beyond its boundaries, thus causing a
kernel crash. (CAN-2005-2456)

Tim Yamin discovered that the driver for compressed ISO file systems
did not sufficiently validate the iput data. By tricking an user into
mounting a malicious CD-ROM with a specially crafted compressed ISO
file system, he could cause a kernel crash. (CAN-2005-2457)

It was discovered that the kernel's embedded zlib compression library
was still vulnerable to two old vulnerabilities of the standalone zlib
library. This library is used by various drivers and can also be used
by third party modules, so the impact varies. (CAN-2005-2458,
CAN-2005-2459)

Peter Sandstrom discovered a remote Denial of Service vulnerability in
the SNMP handler. Certain UDP packages lead to a function call with
the wrong argument, which resulted in a crash of the network stack.
This only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)

Herbert Xu discovered that the setsockopt() function was not
restricted to privileged users. This allowed a local attacker to
bypass intended IPSec policies, set invalid policies to exploit flaws
like CAN-2005-2456, or cause a Denial of Service by adding policies
until kernel memory is exhausted. Now the call is restricted to
processes with the CAP_NET_ADMIN capability. (CAN-2005-2555)

The Ubuntu 5.04 kernel update also fixes a memory leak in the "md"
(Software RAID) driver which eventually lead to kernel memory
exhaustion. Ubuntu 4.10 is not affected by this.
(http://bugs.debian.org/317787)


Updated packages for Ubuntu 4.10 (Warty Warthog):

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21.diff.gz
      Size/MD5:  3150931 2592465ee5409ee070b46abb6db208af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21.dsc
      Size/MD5:     2121 5e1cd652e18a353051f396fd957609b7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz
      Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.21_all.deb
      Size/MD5:  6158086 19d0ccdfd79bb49c64ed07e774147999
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.21_all.deb
      Size/MD5:  1508724 c6639ae2c9c8161dc2e59d453800cade
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21_all.deb
      Size/MD5: 36728390 76dd7c90e34a64853216ab57cb7f4fe0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.21_all.deb
      Size/MD5:   309334 192494d605d7f907e4f5abb00de3fc18

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.21_amd64.deb
      Size/MD5:   248804 8d55088ad0277c7942b04905844c83c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.21_amd64.deb
      Size/MD5:   244778 90b37eb9698a1d496816a0cda72bd137
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.21_amd64.deb
      Size/MD5:   247606 f4f80b507d21fa332a894978a1f74bc1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.21_amd64.deb
      Size/MD5:   243122 fa6e460907d3817c24fb63547fceefe7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_amd64.deb
      Size/MD5:  3180438 c294a14b798342743402ca97eb69cff8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.21_amd64.deb
      Size/MD5: 14352022 9b40c909eb2fef2ca09e717df04e6b30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.21_amd64.deb
      Size/MD5: 14829664 3e22c0fb4f2a444f68eefd54c19dd801
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.21_amd64.deb
      Size/MD5: 14863718 a18e2860b05488856124ec57b84a30c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.21_amd64.deb
      Size/MD5: 14686614 8a829015c2efc262e42374f66df802e8

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.21_i386.deb
      Size/MD5:   278044 0f0ed87c28d52e92ad44ca227a53fef9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.21_i386.deb
      Size/MD5:   273130 89a4ecfae04b6bffff940e3ad38b2f09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.21_i386.deb
      Size/MD5:   275992 4ed3c0fa3502b95ce3b3e1165966c502
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.21_i386.deb
      Size/MD5:   273640 b8746918e52e2f63a95a6f0d156df9fd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.21_i386.deb
      Size/MD5:   276132 c3f93f3f3d34cda6c4642f7828381fd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_i386.deb
      Size/MD5:  3221238 797d734bbe4152e282bd322aa0c28773
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.21_i386.deb
      Size/MD5: 15497320 334177b31b3603f129c37bea25d45d77
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.21_i386.deb
      Size/MD5: 16346430 4f2bf6270d71b0695de4eeed90882809
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.21_i386.deb
      Size/MD5: 16517780 ca57bc5ec9618654f5926111b4444ffb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.21_i386.deb
      Size/MD5: 16450172 80d7d11389a98fb376a6484c4b563e5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.21_i386.deb
      Size/MD5: 16575230 c0fece845baa30df4a910964fb7dcb31

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.21_powerpc.deb
      Size/MD5:   213492 20a0fca0ad9b88e5cb482d6d5e6f40fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.21_powerpc.deb
      Size/MD5:   214526 0798b1a32577dfb2adddb4da11a730f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.21_powerpc.deb
      Size/MD5:   213220 d3e9b0acad728a9a278bf58f1e752f22
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.21_powerpc.deb
      Size/MD5:   214070 422c9839d9fab9b040582abbaeb9a17f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.21_powerpc.deb
      Size/MD5:   213918 19346de3802f2f8e7f7fcf3fca4f57fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.21_powerpc.deb
      Size/MD5:   216150 be02cbae0671d073f6ab69622646a44e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_powerpc.deb
      Size/MD5:  3298218 9148211f6f8c3d54c12510b412befd59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.21_powerpc.deb
      Size/MD5: 16370308 5617bd877f1b0d04ea3b751832ea35b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.21_powerpc.deb
      Size/MD5: 15942120 6aa761fd924ebc01eb41678d3eb0a6b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.21_powerpc.deb
      Size/MD5: 16356246 6ba5b3b0d32f02fdcacd5c3ce454599e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.21_powerpc.deb
      Size/MD5: 15932268 fb678da934f0b16df49b1aef97f90051
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.21_powerpc.deb
      Size/MD5: 16292410 af41ad03cf3e13f964ff4007b22f6c5f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.21_powerpc.deb
      Size/MD5: 15975292 03d379b33553b12b194c81039d91f7db

Updated packages for Ubuntu 5.04 (Hoary Hedgehog):

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4.diff.gz
      Size/MD5:  6041200 4564aed5352b2e3cb8f172a30887ddb1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4.dsc
      Size/MD5:     2645 7c9af2cf3df003eb9cb19f5ee77644e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.4_all.deb
      Size/MD5:  6780284 4d2dec8b6e6baa5d6e1b90474ee05d91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4_all.deb
      Size/MD5: 37514478 50bf50110a60cd13608dd637c2de57ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.4_all.deb
      Size/MD5:   503476 c66c0ea8a91f5b112af362dc3df5757b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    20828 6a28d2ade25817cc3e2368cb719f7f09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    47396 390b9278ebb802e2c897fb15615cb911
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    88892 e2ae6bba29eb561f3cdd68c751a3e15a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    30020 e49ef4804d666ab23070faf6c706cce1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    41234 3cd553baef921c73dab913686387e2bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    73592 805e5d067c63e70ecd27e326df87b6c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:     5742 ad6fbed07a117d3ab55a100cc45857b7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    34852 3e4f9b315b1f2ec558af3d11adfb30df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    55184 f8d462a04508347ed9e5b7fe04575874
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   112972 16352097c826664188af0f3e7c548edc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    40806 88b025dbe3a6ef3ff196b953372cfe91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   115734 de38182b39528c3cff753aef83fa4282
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   174628 7951046302e24ff2a804ba096c083884
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    82592 1e013fe88ab7a92dc29ef97ba3d5a8fb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:  1465770 f5270288a221e150b59ca767e664640c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.4_amd64.deb
      Size/MD5:   285430 f1167642c6061177e41fe5a216a1eef5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.4_amd64.deb
      Size/MD5:   282344 ce210d40b0366ea80d0ebbdb022d3faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.4_amd64.deb
      Size/MD5:   284322 d3aee75b29b7a6380810efbff39014e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.4_amd64.deb
      Size/MD5:   280016 0fae42f06be47a805e99ad30a9b853d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_amd64.deb
      Size/MD5:  6136286 f3789612e6dcdc712b54ae913a388373
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.4_amd64.deb
      Size/MD5: 14573534 2cae783edd734f1f2856bd9ebf07de2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.4_amd64.deb
      Size/MD5: 15121222 ea5fceb7f01367bfea3c75cee2ba1ca8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.4_amd64.deb
      Size/MD5: 15086566 d577f2ae4be792d392fe39862b763af9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.4_amd64.deb
      Size/MD5: 14960568 8b5044dbe7e197a081176aefa881e20c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_amd64.deb
      Size/MD5:  1350520 992d26c9208eaa58d73431e848300ad7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    14226 f9b3f5692bc97b2b6126463beb079bba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   178480 ed673c280dbc72f585d9f758250d5b7f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   174854 da683587fa305fe60f9fceea108e3fbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   731046 dec8eb5c577d960c510de5859fddc6e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   780902 55dac3746af67a93e0216c7663d11080
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   150018 ce51c5a21dcf081b55ff133c7551fe7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   168132 fe6470ed4149c966ad0b02f5837bb53f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:     9560 45138e7132c22d07250a4d08f965241c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    94858 9c6b98daee160ee106415cc71d631877
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    45728 ff3f87447c5b4cdf7ff6f92c958cf25f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    33162 a7b48c602f2beffc6540c4ebc192b917
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    55286 5924910f721ae41bcd8e5fee3faf3a92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:     4662 4ea53b1b6d8ddc11406353a2929f1ac5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:     7840 cb3fe4f61299ed2624e920b0d5a5ad18
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    53804 a69417f7f8c48ad5871cd4b8ca2f2e70
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   111112 6d327d30d7b7adb3197adc0bd39a67be
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    10164 c898bdf01a889bcf62211f8fba618a87
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    60460 f38cbf0cda98d6df39b7a29a6553dad8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   208568 297295a2a62b5925c18da8c79f8fd217
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    69254 fd6d705e6a6381b63e39f8ec087c4af4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   394750 2d6e4b96116becfbc127e801c8bfb5f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   294482 c5877bc5d5ce6a16a945fcfdd03663b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    12078 4b19866599d12de319dcd9363470115f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    22658 4712b3ca6d5b7a0ace1f9b5148b842b0
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    28796 06b5d6185f35669e38971306f10992ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    56782 1660dab0f77a74a859cfa63a71042375
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:    34936 06fd69670c6aab6f422878860490e8db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb
      Size/MD5:   247456 73714c2c823c2cd541cebc015ab744e2

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    18156 c8b2f02968c7eee342a49b5251b71a8a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    44824 d89baaedf6345e30e39b3cf796d175d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   103034 bebdea2e76c271c429e885fc5ecdc77f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    86000 f96e58f5f41fecec7deed5e24df0b714
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    29090 76b983db144df6d9ee771fdce7029ca6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    39770 d1b068bb72fcf316156878c7970ab373
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    71146 ddae881a5548dfc43778a72de0c64f26
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:     5500 34d41df49453a7d36f16fb1dd24db6e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    31580 850469c10a719fef4d80bf9162b845ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    52938 4d6071502a847a572fa66d99920fec88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   104448 7832f619154558c2cab1d03eb896b125
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    38622 df81ddcb826807946f82069b1e1a6a43
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   114568 4bc16f98c3fa2053954a2bb3f7acc4d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   190646 eb1382c61174e9bae6bfdc6e6e401e98
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    86538 53a7321e67d1ef5886bc97345ea65f3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:  1389502 8306eb54c3640159b9f08ff6e6b2f29b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.4_i386.deb
      Size/MD5:   313384 f66fd0977b03e7dd7f0214c62f47b91a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.4_i386.deb
      Size/MD5:   308948 8dd9e78a1943e479aa0dae0e26526f4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.4_i386.deb
      Size/MD5:   311196 b9940d417b4dd26a97db35d93e221c93
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.4_i386.deb
      Size/MD5:   309152 6ceaa7d2a2608427503cdae992c1a0b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.4_i386.deb
      Size/MD5:   311306 5f48f618c6375c4c5e9a62cc558ef9f3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_i386.deb
      Size/MD5:  6133154 bfb429c7674a9aed5cf4f50801043acf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.4_i386.deb
      Size/MD5: 15611142 f798f9c9d08bdf0ad17d98a5d32419f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.4_i386.deb
      Size/MD5: 16187540 c9ef6d027e3ccb35602e217ccfacf4a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.4_i386.deb
      Size/MD5: 16606154 357b76381f4582f084c66886ccdd5b45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.4_i386.deb
      Size/MD5: 16294386 4d9d2ee80fcbdab06aa498282ea8dc54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.4_i386.deb
      Size/MD5: 16671724 08f654e995fefcd22ac8b5796e4b8b37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_i386.deb
      Size/MD5:  1345436 c0950b5b624e314ee6d4c25a4c86ee57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    14074 1bac2a7dd02bb7b9d295c68b83d70aa6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   183160 600f0c2daa02218e1ce41b24e2d3eb76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   172738 8d3551377c4db082ebdd7f662652646c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   967776 fb33397fc93defb6caea6da53b15caee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   780704 dab5953d0c85d39ffdbfc8c2d8ab294b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   140652 dd03b224f23e7ac4a9d159af609224d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   167958 2ca7c46af16597a0daf41f64b10d9db8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:     9340 c35aece8d1b9990ca05692ba780cdf16
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    89324 57e508e34fa99d19104780918cab302e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    48130 eb4ea28a87fc027482246d97b5626899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    30882 9454b412769a75d8c824561eadf62db6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    65890 ff683c39e4b989c1315a8c203633e9ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:     4500 cf6d5176a96775a82371eb883063183d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:     7750 0f3edff0714149fa18539f54407ee5df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    50772 5002eb27a78dd0164f50d8153e3b3e5d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   111586 249e36cf94a9f4da0deddf662f1ff0c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:     9890 7658d131f0f492bd48bff35e64f4ced8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    57146 e7e56adfede67694e7b76d51d5e04edb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   241930 a1ae0a86b71761e1776d5dd76b55c21a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    66226 6adddaf96a50183939a4a0e22b3a4ff2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   436516 8b63963c51b1ec04420d068ebebbea94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   485666 9ce812efd370a2e8d248ab43984880fd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    11470 5e43542b223c13898d77ba4a8e273193
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    21240 3005e76d6d59a7630d82baedd092af89
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    29524 e3a0cdc7879b18ae0631e0ca14e8eb9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   106140 7f220883426d1b17cdeed44ea1d2174b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:    33818 a98c73148bfe00e48314222e2d0139ed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb
      Size/MD5:   261336 62ef9590de3e912383969f2197b6cc00

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    24052 abc25938a2b1e6d1de8c258fd3b2ff09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    24050 a6e734975aadd9eac25f2188cd537d1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    24036 04752ff30bea278fd74a30332c027088
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    58274 e185737861b39d526be448f5075a44d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    58278 7de5e5723f3f4925a2952288836670e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    58264 5d1ac6ea1c2813b6a9b286617cdc8dbd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    30286 46dd898ac6263ec0bc37246992df0d6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    30284 dc63a525784387fe2a8b11709382a83b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    30262 601200b0d70b58f217adf2d75c586a59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   109256 5b7ac7750db740a1871b209fa8dec2d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   109254 1620597776fdaa117c1f60c852ef184a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   109226 c8604627c649578cee5c1477b0a4a03c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    35384 1552df305c8b64db2654190188b8a93f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    35380 ba6bb83f878f291f9bdb0e35d15f4673
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    35380 286ce7234264d10133d13d00bc9ee726
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    30934 9d0ca7d879a298c13f914df7d6d71cc6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    30932 fb267c2199cfd65d21a1af13bdc71c6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    30914 8af0e49bbf3c04e69fce71ad5a5b7f06
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   212962 4c06439a55b889b39e6bd0ab76dec4d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   212950 282471171b183a704d148b6ae4ceb5a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   212930 68b795c8b3015a5ec7cb934a6d48cee5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     6166 d24b91f0c72482aa7988f67c1e9ec899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     6164 9a7834b0dd749398f777d17893ecd228
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     6156 4ecfd79e504f9e20df37a70266a58570
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    43422 5cbade59079e7fb4ee21d81c01f90815
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    43416 856868a1c1e6c92f5216f5b03d4d0902
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    43422 a7995f72bdd1ce689793a92767605db6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     4582 c0fe9553c17d6668b545ee025c76366c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     4586 ffdff9ffecf48ba5d084b97ac9343c08
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     4590 23483028a94dd59b980cd918098bee2b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    66004 c7e9c5e2b51c040e93a24bb0e91127f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    65992 2a0482a7c789593e418732cef226df1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    66002 a9ddbe1988133503ba0749ca79541904
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   117104 dcf6f4179e46d476a3a7b1c095d34629
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   117104 740994399f2cd9249273e5657d3365d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   116854 0bad2ab33539f124797b20967db0e251
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    66632 2c0c68f4af7e27f7dd1c1b55f1c04811
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    66628 6791905b4d99c4863e91c7e177281dd6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    66626 de6019978daa56e20067d34863152736
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   142064 5cb5408755a2288c27378280be9eccb7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   142060 cfa6b645e81bdaea47f87eeac15483bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   142060 05a5254948ac70029db1835074865750
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   213964 9219869952bf8531856b574ffa74aa47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   213972 35d11ed0bebb6dc163815f7240e8a173
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   213880 3f38edccc43485077cce0ae5091cdb9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   107006 6190487d80141d37710f23557b525e5d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   107002 51da3578513b1233d8a662869f1e9d22
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   107008 8a188ee440b32700bfb6cfa2f3ac3cf1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:  1866202 3b03b8f24408f780499a2280ab5914a6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:  1870588 f88e18156ae774b0c5f65179f86195ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:  1900896 91464e45b94aef452f98299e6e26af11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.4_powerpc.deb
      Size/MD5:   249258 980ad70aaf96f3f211e7b19dc7fdd86e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.4_powerpc.deb
      Size/MD5:   248698 8cafb8a776bd39eb4438a38b78ec3051
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.4_powerpc.deb
      Size/MD5:   248980 6ff81e40b4b746df89d515388127afb4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.4_powerpc.deb
      Size/MD5:   248514 3fffb5b8a615a1e8446b68ba3df3e39a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.4_powerpc.deb
      Size/MD5:   249542 4ae94182401b51c9186c817afffb1270
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.4_powerpc.deb
      Size/MD5:   250280 efefb8b619fedb90072122e93a8b8dd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_powerpc.deb
      Size/MD5:  6154248 61bd2cb9c413ab3491b9ae9406ccaf50
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.4_powerpc.deb
      Size/MD5: 15640972 3d2c68fa213750fd802ca6161502e6a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.4_powerpc.deb
      Size/MD5: 15206638 d96473548cc05ea4afbaf2936c37d907
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.4_powerpc.deb
      Size/MD5: 15634972 b165001d375e4f681b8ccb9489673d23
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.4_powerpc.deb
      Size/MD5: 15203542 19ad28dc6b46cbe57a709526de9f1883
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.4_powerpc.deb
      Size/MD5: 15549118 cdba867e5b824bd8b82488864e92bb37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.4_powerpc.deb
      Size/MD5: 15239942 b35e338e07cf4e3082bb6e9ec8981e09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_powerpc.deb
      Size/MD5:  1350442 2d992bd6f0940acc06fe578a1fe50df4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    17356 1fbf0503244841ccc2cca1376f9dfe07
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    17350 bc18075b026098a566aab6b8d37e5f53
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    17348 b92c52442e03132c35dccd51f031433d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   213700 e8cbef93f620de254f38b16d94c8cad7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   213704 1b236bbc45581c8a44c7653d7ef74225
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   213456 cf3e1620175520ec68df43c0561a2e1d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   210744 ae1e3581a81798fc87d6a3e12ed8fe68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   210738 c139802d773a9edf9f548f6a411d38bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   210746 2b4741a7b048c9cc2f2fdba21848931c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   688402 4d8ba23ea3ccd23b502208203ac8fbb5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   688390 cd35997285931206e6edaf9d1c7a48b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   686902 1c07f36b031d25333df2203e27bd2bc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   780756 809f17eac747631ee615564a5220e368
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   780760 10241efc871efe6c693008d806012a3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   780754 728bb28daa6c1e28b3db25ba498835b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   511224 a69435af26ba591e456ae346043ed409
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   511208 4ebaad08d54181a924c275743a33182d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   510820 fdb5ceb1fa2455eea15e2f284a0184c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   257728 41aeb60fee29134ecc400924b9450077
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   257740 e10ecec651e3769346346672a4b77f74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   256836 6e57d0e84467c3acf6539501720d89dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    84380 b22a548620e355c07e5a3c8f2591bd78
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    84376 a8585fd6f9857f27f2f91f15bce13279
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    84348 15c2f42f7ef574dfedb693bec36c711a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    60978 054ca4f16b23dff4177f2833d8fb9ea7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    60978 108192a0f49156783ed62a55acccde3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    60988 7bd3fa858adcdf474a1bc60910e92d35
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    64992 31ae64714539561096ab9a75095de30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    64982 355505547976c14bbe139ca789e92873
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    64986 e70294d49e5c0d10cbbe0515060cbc0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     5382 c4e5f79a8b43b58b9a3146289c0b1d82
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     5370 5fd0a5c57471a590421c623262bade18
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:     5372 ed68cb495810074bbc2a521c33bf8c7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    63274 f2cba33f50a346ad93077daf585768a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    63278 6dce997e84418d3788b6690ee8194060
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    63236 72b78c7fb5387e3161cf77b5af58afa9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   131650 a56e73735c1704020a2ee1fe501e79ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   131656 2dc16c18005bb067d91580778dbae86b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   131658 7a603fd568409f78b819314afefbf422
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    70972 f3531083b555d16dd21c2ffb93ff04bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    70966 17be0d275f722064e30435c2bded8b99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    70954 d687ecc45c59809e129f792deb69e1b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   357314 c87339fdacfb0480e8443fbaf4f139f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   357314 d7acafdee379e58485fbca448221ecbb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   357316 2993896bd530953dd16bb770bcdd1ff3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    80736 2e84feb28afa95eabb5617f2597a061a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    80728 faabb575292c21b835a54de5375c3fa2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    80730 b0759874f1d0c1294419cf0915f2b796
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   510996 b81d9bf2579b8fcca23b0aab66d4d28a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   510960 e5b50081348bc3af756216675a891996
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   510768 1ad843acc177777866d32791c4a69ea2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   389138 2dfe82992d82f2b15afb4ebbe5cedc21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   389106 4d1230c31370601a32295eb387e2bc36
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   389008 cc4035e395b40d79fa97e7f865dd61b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    63152 bfb4a55b3affd9c4ea770c62133e80c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    63156 2de449953957fdd1b34a3186a54b14c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    63036 3e95675cd14231f7768726a93d804160
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    23352 e9ccec94846d519150a4e47be2beb0cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    23342 dc6cbc746043ac814b01101bb36681a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    23106 55dc74da748e726a127836501b681b93
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    35380 4267ca2d2e8477e2479a0802f1d4765f
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    35384 9cb4434b76aca13bc2c509d370d18358
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    35372 a3377e7a166ee10d093914c04230b068
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   135020 41efac30647f0d5159d9e9fdaa15e695
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   135002 6171459fc37d36c95f4f151c9f9ae00e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   134994 7b7c9557b7b55ee6f31236776b3d9b11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    42402 f1c63319e3bb1b2d3a0ad1cdcf5920f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    42396 e403ab194ff512d4b9f8d3d0207803b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:    42398 27603e03819ba38ab5fd4620a5993be4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   294748 3947fda076c41887667e552f6c95b671
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   294752 4d38b285cc09b059d09a585ed7a3644a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb
      Size/MD5:   294744 49b5f5c12fe75167a0f572b55336ae6b
    

- 漏洞信息

19028
Linux Kernel zlib inflate.c huft_build Function NULL Pointer Dereference Local DoS
Remote / Network Access Denial of Service
Loss of Availability Upgrade
Exploit Unknown Vendor Verified

- 漏洞描述

Linux Kernel contains a flaw in the huft_build function of inflate.c in zlib that may allow a remote denial of service. The issue will result in a NULL pointer dereference, which will cause a loss of availability for the system.

- 时间线

2005-07-25 Unknow
Unknow Unknow

- 解决方案

It has been reported that this issue has been fixed. Upgrade to version 2.6.12.5, or higher, to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel ZLib Local Null Pointer Dereference Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 14720
No Yes
2005-09-01 12:00:00 2006-05-26 10:48:00
The discoverer of this vulnerability is currently unknown. This vulnerability was announced in the referenced Gentoo bugzilla bug report.

- 受影响的程序版本

Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
S.u.S.E. UnitedLinux 1.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
+ Red Hat Fedora Core4
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
+ S.u.S.E. Linux Enterprise Server 9
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.1
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Conectiva Linux 10.0
Linux kernel 2.6.12 .5

- 不受影响的程序版本

Linux kernel 2.6.12 .5

- 漏洞讨论

The Linux kernel is prone to a denial-of-service vulnerability. This issue is due to a failure in the application to properly handle malformed compressed files.

An attacker can exploit this vulnerability to cause a kernel crash, effectively denying service to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Please see the referenced advisories for further information.

This issue has been addressed in Linux kernel 2.6.12.5:


Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test11

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6

Linux kernel 2.6 -test3

Linux kernel 2.6 .10

Linux kernel 2.6 -test5

Linux kernel 2.6 -test1

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test8

Linux kernel 2.6 -test10

Linux kernel 2.6.1 -rc1

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

Linux kernel 2.6.11

Linux kernel 2.6.11 .6

Linux kernel 2.6.11 -rc2

Linux kernel 2.6.11 .5

Linux kernel 2.6.11 -rc3

Linux kernel 2.6.11 -rc4

Linux kernel 2.6.11 .11

Linux kernel 2.6.11 .7

Linux kernel 2.6.12 .4

Linux kernel 2.6.12 .3

Linux kernel 2.6.12 .1

Linux kernel 2.6.12 -rc4

Linux kernel 2.6.12 .2

Linux kernel 2.6.2

Linux kernel 2.6.3

Linux kernel 2.6.4

Linux kernel 2.6.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站