CVE-2006-2936
CVSS7.8
发布时间 :2006-07-10 15:05:00
修订时间 :2012-03-19 00:00:00
NMCOPS    

[原文]The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued.


[CNNVD]Linux Kernel的USB驱动的ftdi_sio模块拒绝服务漏洞(CNNVD-200607-107)

        Linux Kernel是开放源码操作系统Linux所使用的内核。
        Linux Kernel的USB驱动的ftdi_sio模块中存在拒绝服务漏洞,本地攻击者可以导致内存耗尽。
        能够访问设备的攻击者可以向串口发送大量数据,以至于驱动来不及完全处理,这样数据就会大量的排在队列中,导致耗尽内存。

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-399 [资源管理错误]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.11:rc5Linux Kernel 2.6.11 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.12.2Linux Kernel 2.6.12.2
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.10:rc3Linux Kernel 2.6.10 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.16.27Linux Kernel 2.6.16.27
cpe:/o:linux:linux_kernel:2.6.15:rc4Linux Kernel 2.6.15 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.14:rc4Linux Kernel 2.6.14 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.9:rc1Linux Kernel 2.6.9 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.16.13Linux Kernel 2.6.16.13
cpe:/o:linux:linux_kernel:2.6.11.6Linux Kernel 2.6.11.6
cpe:/o:linux:linux_kernel:2.6.16.24Linux Kernel 2.6.16.24
cpe:/o:linux:linux_kernel:2.6.16.14Linux Kernel 2.6.16.14
cpe:/o:linux:linux_kernel:2.6.5:rc3Linux Kernel 2.6.5 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.16.15Linux Kernel 2.6.16.15
cpe:/o:linux:linux_kernel:2.6.14.2Linux Kernel 2.6.14.2
cpe:/o:linux:linux_kernel:2.6.4:rc3Linux Kernel 2.6.4 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.16:rc1Linux Kernel 2.6.16 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.16.8Linux Kernel 2.6.16.8
cpe:/o:linux:linux_kernel:2.6.3:rc1Linux Kernel 2.6.3 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13:rc1Linux Kernel 2.6.13 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13:rc3Linux Kernel 2.6.13 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.7:rc3Linux Kernel 2.6.7 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.16Linux Kernel 2.6.16
cpe:/o:linux:linux_kernel:2.6.16.3Linux Kernel 2.6.16.3
cpe:/o:linux:linux_kernel:2.6.16:rc5Linux Kernel 2.6.16 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.16.11Linux Kernel 2.6.16.11
cpe:/o:linux:linux_kernel:2.6.13:rc7Linux Kernel 2.6.13 Release Candidate 7
cpe:/o:linux:linux_kernel:2.6.17:rc1Linux Kernel 2.6.17 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.15Linux Kernel 2.6.15
cpe:/o:linux:linux_kernel:2.6.15.3Linux Kernel 2.6.15.3
cpe:/o:linux:linux_kernel:2.6.11.3Linux Kernel 2.6.11.3
cpe:/o:linux:linux_kernel:2.6.13:rc4Linux Kernel 2.6.13 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.15:rc1Linux Kernel 2.6.15 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.2:rc2Linux Kernel 2.6.2 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.5:rc2Linux Kernel 2.6.5 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.12:rc4Linux Kernel 2.6.12 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.13:rc2Linux Kernel 2.6.13 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.17:rc5Linux Kernel 2.6.17 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.15.7Linux Kernel 2.6.15.7
cpe:/o:linux:linux_kernel:2.6.3:rc4Linux Kernel 2.6.3 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.11.9Linux Kernel 2.6.11.9
cpe:/o:linux:linux_kernel:2.6.10:rc1Linux Kernel 2.6.10 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.12.1Linux Kernel 2.6.12.1
cpe:/o:linux:linux_kernel:2.6.16:rc3Linux Kernel 2.6.16 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.9:rc4Linux Kernel 2.6.9 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.8:rc3Linux Kernel 2.6.8 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.2:rc3Linux Kernel 2.6.2 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12:rc1Linux Kernel 2.6.12 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.17:rc2Linux Kernel 2.6.17 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.16:rc2Linux Kernel 2.6.16 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.16.7Linux Kernel 2.6.16.7
cpe:/o:linux:linux_kernel:2.6.14.4Linux Kernel 2.6.14.4
cpe:/o:linux:linux_kernel:2.6.14.6Linux Kernel 2.6.14.6
cpe:/o:linux:linux_kernel:2.6.8:rc4Linux Kernel 2.6.8 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.16.31Linux Kernel 2.6.16.31
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.2Linux Kernel 2.6.11.2
cpe:/o:linux:linux_kernel:2.6.16.22Linux Kernel 2.6.16.22
cpe:/o:linux:linux_kernel:2.6.16.12Linux Kernel 2.6.16.12
cpe:/o:linux:linux_kernel:2.6.2:rc1Linux Kernel 2.6.2 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.6.1:rc3Linux Kernel 2.6.1 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12:rc6Linux Kernel 2.6.12 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.16:rc6Linux Kernel 2.6.16 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.16.26Linux Kernel 2.6.16.26
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.4Linux Kernel 2.6.11.4
cpe:/o:linux:linux_kernel:2.6.12.3Linux Kernel 2.6.12.3
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.11.12Linux Kernel 2.6.11.12
cpe:/o:linux:linux_kernel:2.6.17:rc6Linux Kernel 2.6.17 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.15.2Linux Kernel 2.6.15.2
cpe:/o:linux:linux_kernel:2.6.16.17Linux Kernel 2.6.16.17
cpe:/o:linux:linux_kernel:2.6.9Linux Kernel 2.6.9
cpe:/o:linux:linux_kernel:2.6.16.1Linux Kernel 2.6.16.1
cpe:/o:linux:linux_kernel:2.6.13:rc5Linux Kernel 2.6.13 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.16.28Linux Kernel 2.6.16.28
cpe:/o:linux:linux_kernel:2.6.16.30Linux Kernel 2.6.16.30
cpe:/o:linux:linux_kernel:2.6.7:rc2Linux Kernel 2.6.7 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.16.18Linux Kernel 2.6.16.18
cpe:/o:linux:linux_kernel:2.6.4:rc2Linux Kernel 2.6.4 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11:rc2Linux Kernel 2.6.11 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.15:rc5Linux Kernel 2.6.15 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.15:rc7Linux Kernel 2.6.15 Release Candidate 7
cpe:/o:linux:linux_kernel:2.6.16.4Linux Kernel 2.6.16.4
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13.3Linux Kernel 2.6.13.3
cpe:/o:linux:linux_kernel:2.6.15:rc3Linux Kernel 2.6.15 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.15.1Linux Kernel 2.6.15.1
cpe:/o:linux:linux_kernel:2.6.16.19Linux Kernel 2.6.16.19
cpe:/o:linux:linux_kernel:2.6.13.5Linux Kernel 2.6.13.5
cpe:/o:linux:linux_kernel:2.6.6:rc2Linux Kernel 2.6.6 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.14.7Linux Kernel 2.6.14.7
cpe:/o:linux:linux_kernel:2.6.16.25Linux Kernel 2.6.16.25
cpe:/o:linux:linux_kernel:2.6.9:rc2Linux Kernel 2.6.9 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.6:rc3Linux Kernel 2.6.6 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.13.2Linux Kernel 2.6.13.2
cpe:/o:linux:linux_kernel:2.6.16.2Linux Kernel 2.6.16.2
cpe:/o:linux:linux_kernel:2.6.14:rc3Linux Kernel 2.6.14 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.15.6Linux Kernel 2.6.15.6
cpe:/o:linux:linux_kernel:2.6.8.1Linux Kernel 2.6.8.1
cpe:/o:linux:linux_kernel:2.6.11:rc3Linux Kernel 2.6.11 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12Linux Kernel 2.6.12
cpe:/o:linux:linux_kernel:2.6.11:rc4Linux Kernel 2.6.11 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.15:rc2Linux Kernel 2.6.15 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.14:rc1Linux Kernel 2.6.14 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.5:rc1Linux Kernel 2.6.5 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13.1Linux Kernel 2.6.13.1
cpe:/o:linux:linux_kernel:2.6.12:rc5Linux Kernel 2.6.12 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.16.20Linux Kernel 2.6.16.20
cpe:/o:linux:linux_kernel:2.6.15:rc6Linux Kernel 2.6.15 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.12.5Linux Kernel 2.6.12.5
cpe:/o:linux:linux_kernel:2.6.15.5Linux Kernel 2.6.15.5
cpe:/o:linux:linux_kernel:2.6.13.4Linux Kernel 2.6.13.4
cpe:/o:linux:linux_kernel:2.6.3:rc3Linux Kernel 2.6.3 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.16.16Linux Kernel 2.6.16.16
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.9:rc3Linux Kernel 2.6.9 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12:rc2Linux Kernel 2.6.12 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.14.5Linux Kernel 2.6.14.5
cpe:/o:linux:linux_kernel:2.6.11:rc1Linux Kernel 2.6.11 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.12.6Linux Kernel 2.6.12.6
cpe:/o:linux:linux_kernel:2.6.16.9Linux Kernel 2.6.16.9
cpe:/o:linux:linux_kernel:2.6.12.4Linux Kernel 2.6.12.4
cpe:/o:linux:linux_kernel:2.6.14:rc2Linux Kernel 2.6.14 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.8Linux Kernel 2.6.11.8
cpe:/o:linux:linux_kernel:2.6.3:rc2Linux Kernel 2.6.3 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.17:rc3Linux Kernel 2.6.17 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.16.5Linux Kernel 2.6.16.5
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.4:rc1Linux Kernel 2.6.4 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13Linux Kernel 2.6.13
cpe:/o:linux:linux_kernel:2.6.8:rc2Linux Kernel 2.6.8 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.16.23Linux Kernel 2.6.16.23
cpe:/o:linux:linux_kernel:2.6.17:rc4Linux Kernel 2.6.17 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.14:rc5Linux Kernel 2.6.14 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.16.10Linux Kernel 2.6.16.10
cpe:/o:linux:linux_kernel:2.6.10:rc2Linux Kernel 2.6.10 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.5Linux Kernel 2.6.11.5
cpe:/o:linux:linux_kernel:2.6.16.29Linux Kernel 2.6.16.29
cpe:/o:linux:linux_kernel:2.6.17Linux Kernel 2.6.17
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.12:rc3Linux Kernel 2.6.12 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.15.4Linux Kernel 2.6.15.4
cpe:/o:linux:linux_kernel:2.6.8:rc1Linux Kernel 2.6.8 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.11Linux Kernel 2.6.11.11
cpe:/o:linux:linux_kernel:2.6.11.7Linux Kernel 2.6.11.7
cpe:/o:linux:linux_kernel:2.6.16.6Linux Kernel 2.6.16.6
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.14Linux Kernel 2.6.14
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.11.1Linux Kernel 2.6.11.1
cpe:/o:linux:linux_kernel:2.6.14.1Linux Kernel 2.6.14.1
cpe:/o:linux:linux_kernel:2.6.16:rc4Linux Kernel 2.6.16 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.13:rc6Linux Kernel 2.6.13 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.14.3Linux Kernel 2.6.14.3
cpe:/o:linux:linux_kernel:2.6.16.21Linux Kernel 2.6.16.21
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.6.11.10Linux Kernel 2.6.11.10

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10265The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a d...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2936
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-107
(官方数据源) CNNVD

- 其它链接及资源

http://www.kernel.org/git/?p=linux/kernel/git/gregkh/patches.git;a=blob;h=4b4d9cfea17618b80d3ac785b701faeaf60141f1;hb=396eb2aac550ec55856c6843ef9017e800c3d656
(PATCH)  CONFIRM  http://www.kernel.org/git/?p=linux/kernel/git/gregkh/patches.git;a=blob;h=4b4d9cfea17618b80d3ac785b701faeaf60141f1;hb=396eb2aac550ec55856c6843ef9017e800c3d656
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197610
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197610
http://xforce.iss.net/xforce/xfdb/27807
(UNKNOWN)  XF  linux-ftdi-sio-dos(27807)
http://www.vupen.com/english/advisories/2006/2841
(VENDOR_ADVISORY)  VUPEN  ADV-2006-2841
http://www.ubuntu.com/usn/usn-346-1
(UNKNOWN)  UBUNTU  USN-346-1
http://www.ubuntu.com/usn/usn-331-1
(UNKNOWN)  UBUNTU  USN-331-1
http://www.securityfocus.com/bid/19033
(UNKNOWN)  BID  19033
http://www.securityfocus.com/archive/1/archive/1/440300/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060717 rPSA-2006-0130-1 kernel
http://www.redhat.com/support/errata/RHSA-2006-0617.html
(UNKNOWN)  REDHAT  RHSA-2006:0617
http://www.osvdb.org/27119
(UNKNOWN)  OSVDB  27119
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2007:035
http://www.novell.com/linux/security/advisories/2007_30_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2007:030
http://www.novell.com/linux/security/advisories/2007_21_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2007:021
http://www.novell.com/linux/security/advisories/2007_18_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2007:018
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
(UNKNOWN)  MANDRIVA  MDKSA-2006:151
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
(UNKNOWN)  MANDRIVA  MDKSA-2006:150
http://www.debian.org/security/2006/dsa-1184
(UNKNOWN)  DEBIAN  DSA-1184
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
http://secunia.com/advisories/25683
(VENDOR_ADVISORY)  SECUNIA  25683
http://secunia.com/advisories/25226
(VENDOR_ADVISORY)  SECUNIA  25226
http://secunia.com/advisories/24547
(VENDOR_ADVISORY)  SECUNIA  24547
http://secunia.com/advisories/22174
(VENDOR_ADVISORY)  SECUNIA  22174
http://secunia.com/advisories/22093
(VENDOR_ADVISORY)  SECUNIA  22093
http://secunia.com/advisories/21934
(VENDOR_ADVISORY)  SECUNIA  21934
http://secunia.com/advisories/21614
(VENDOR_ADVISORY)  SECUNIA  21614
http://secunia.com/advisories/21605
(VENDOR_ADVISORY)  SECUNIA  21605
http://secunia.com/advisories/21298
(VENDOR_ADVISORY)  SECUNIA  21298
http://secunia.com/advisories/21057
(VENDOR_ADVISORY)  SECUNIA  21057
http://secunia.com/advisories/20703
(VENDOR_ADVISORY)  SECUNIA  20703

- 漏洞信息

Linux Kernel的USB驱动的ftdi_sio模块拒绝服务漏洞
高危 资源管理错误
2006-07-10 00:00:00 2006-07-25 00:00:00
远程  
        Linux Kernel是开放源码操作系统Linux所使用的内核。
        Linux Kernel的USB驱动的ftdi_sio模块中存在拒绝服务漏洞,本地攻击者可以导致内存耗尽。
        能够访问设备的攻击者可以向串口发送大量数据,以至于驱动来不及完全处理,这样数据就会大量的排在队列中,导致耗尽内存。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.27.tar.bz2

- 漏洞信息 (F49475)

Mandriva Linux Security Advisory 2006.151 (PacketStormID:F49475)
2006-08-28 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2006-1066,CVE-2006-1863,CVE-2006-1864,CVE-2006-2934,CVE-2006-2935,CVE-2006-2936,CVE-2006-3468,CVE-2006-3745
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-151 - A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:151
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : August 25, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to and including 2.6.16-rc2, when running on x86_64 systems with
 preemption enabled, local users can cause a DoS (oops) via multiple
 ptrace tasks that perform single steps (CVE-2006-1066).
 
 Prior to 2.6.16, a directory traversal vulnerability in CIFS could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1863).
 
 Prior to 2.6.16, a directory traversal vulnerability in smbfs could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1864).
 
 Prior to to 2.6.16.23, SCTP conntrack in netfilter allows remote
 attackers to cause a DoS (crash) via a packet without any chunks,
 causing a variable to contain an invalid value that is later used to
 dereference a pointer (CVE-2006-2934).
 
 The dvd_read_bca function in the DVD handling code assigns the wrong
 value to a length variable, which could allow local users to execute
 arbitrary code via a crafted USB storage device that triggers a buffer
 overflow (CVE-2006-2935).
 
 Prior to 2.6.17, the ftdi_sio driver could allow local users to cause
 a DoS (memory consumption) by writing more data to the serial port than
 the hardware can handle, causing the data to be queued (CVE-2006-2936).
 
 The 2.6 kernel, when using both NFS and EXT3, allowed remote attackers
 to cause a DoS (file system panic) via a crafted UDP packet with a V2
 lookup procedure that specifies a bad file handle (inode number),
 triggering an error and causing an exported directory to be remounted
 read-only (CVE-2006-3468).
 
 The 2.6 kernel's SCTP was found to cause system crashes and allow for
 the possibility of local privilege escalation due to a bug in the
 get_user_iov_size() function that doesn't properly handle overflow when
 calculating the length of iovec (CVE-2006-3745).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.
 
 In addition to these security fixes, other fixes have been included
 such as:
 
 - added support for new devices:
   o Testo products in usb-serial
   o ATI SB600 IDE
   o ULI M-1573 south Bridge
   o PATA and SATA support for nVidia MCP55, MCP61, MCP65, and AMD CS5536
   o Asus W6A motherboard in snd-hda-intel
   o bcm 5780
 - fixed ip_gre module unload OOPS
 - enabled opti621 driver for x86 and x86_64
 - fixed a local DoS introduced by an imcomplete fix for CVE-2006-2445
 - updated to Xen 3.0.1 with selected fixes
 - enable hugetlbfs
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1066
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1863
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3468
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 9b4811892823bfa6ddfa648f029ee500  2006.0/RPMS/kernel-2.6.12.25mdk-1-1mdk.i586.rpm
 27e6afeac2d98e07cd8a16d2ffa8de28  2006.0/RPMS/kernel-BOOT-2.6.12.25mdk-1-1mdk.i586.rpm
 dcd2a1843a5f56c286a0e6270c7b1d79  2006.0/RPMS/kernel-i586-up-1GB-2.6.12.25mdk-1-1mdk.i586.rpm
 477b78d6836d03484a58720f2137e506  2006.0/RPMS/kernel-i686-up-4GB-2.6.12.25mdk-1-1mdk.i586.rpm
 ab1f7540dbfd41f469f4931a710dbe95  2006.0/RPMS/kernel-smp-2.6.12.25mdk-1-1mdk.i586.rpm
 ed246f8b552bb26bb8e89c0c0842bbe9  2006.0/RPMS/kernel-source-2.6.12.25mdk-1-1mdk.i586.rpm
 acb15b08ed7f7d2ad3747c555a07b401  2006.0/RPMS/kernel-source-stripped-2.6.12.25mdk-1-1mdk.i586.rpm
 ede19a2f7dd7b715c58e9c61ee1c3359  2006.0/RPMS/kernel-xbox-2.6.12.25mdk-1-1mdk.i586.rpm
 848a9f9725f141077a34affb42088946  2006.0/RPMS/kernel-xen0-2.6.12.25mdk-1-1mdk.i586.rpm
 d280fd356d01831e6dbe5f0fc73c741b  2006.0/RPMS/kernel-xenU-2.6.12.25mdk-1-1mdk.i586.rpm
 c0a388efafe83a187a58d582ddf9cafb  2006.0/SRPMS/kernel-2.6.12.25mdk-1-1mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 54c6b69a3ce44d4dfb217f4b4f620293  x86_64/2006.0/RPMS/kernel-2.6.12.25mdk-1-1mdk.x86_64.rpm
 0eded734bf839d253c18d4849507a687  x86_64/2006.0/RPMS/kernel-BOOT-2.6.12.25mdk-1-1mdk.x86_64.rpm
 c379d55bcaee5070b46475b2e1cbce0a  x86_64/2006.0/RPMS/kernel-smp-2.6.12.25mdk-1-1mdk.x86_64.rpm
 2fad12f6ea68fdd1d000c2602f47a0a3  x86_64/2006.0/RPMS/kernel-source-2.6.12.25mdk-1-1mdk.x86_64.rpm
 1ae8c5f75d5660e511cfe2db62a02056  x86_64/2006.0/RPMS/kernel-source-stripped-2.6.12.25mdk-1-1mdk.x86_64.rpm
 160c2425b4be695feaafffdb59cc8fcd  x86_64/2006.0/RPMS/kernel-xen0-2.6.12.25mdk-1-1mdk.x86_64.rpm
 677a458c0eb70f9f8a5bd9553b96f589  x86_64/2006.0/RPMS/kernel-xenU-2.6.12.25mdk-1-1mdk.x86_64.rpm
 c0a388efafe83a187a58d582ddf9cafb  x86_64/2006.0/SRPMS/kernel-2.6.12.25mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFE7xpfmqjQ0CJFipgRAio9AKDjb4g8obg5dkOccjQOlFQ6oeIKAQCgkNQ3
ZdXAs/f1g9RsGP1wVlrqg+U=
=TeRg
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F49474)

Mandriva Linux Security Advisory 2006.150 (PacketStormID:F49474)
2006-08-28 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2006-0554,CVE-2006-0744,CVE-2006-1343,CVE-2006-1857,CVE-2006-1858,CVE-2006-1863,CVE-2006-1864,CVE-2006-2274,CVE-2006-2935,CVE-2006-2936,CVE-2006-3468,CVE-2006-3745
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-150 - A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:150
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : August 25, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to 2.6.15.5, the kerenl allowed local users to obtain sensitive
 information via a crafted XFS ftruncate call (CVE-2006-0554).
 
 Prior to 2.6.15.5, the kernel did not properly handle uncanonical
 return addresses on Intel EM64T CPUs causing the kernel exception
 handler to run on the user stack with the wrong GS (CVE-2006-0744).
 
 ip_conntrack_core.c in the 2.6 kernel, and possibly
 nf_conntrack_l3proto_ipv4.c did not clear sockaddr_in.sin_zero before
 returning IPv4 socket names from the getsockopt function with
 SO_ORIGINAL_DST, which could allow local users to obtain portions of
 potentially sensitive memory (CVE-2006-1343).
 
 Prior to 2.6.16.17, the a buffer overflow in SCTP in the kernel allowed
 remote attackers to cause a Denial of Service (crash) and possibly
 execute arbitrary code via a malformed HB-ACK chunk (CVE-2006-1857).
 
 Prior to 2.6.16.17, SCTP in the kernel allowed remote attackers to
 cause a DoS (crash) and possibly execute arbitrary code via a chunk
 length that is inconsistent with the actual length of provided
 parameters (CVE-2006-1858).
 
 Prior to 2.6.16, a directory traversal vulnerability in CIFS could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1863).
 
 Prior to 2.6.16, a directory traversal vulnerability in smbfs could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1864).
 
 Prior to 2.6.17, Linux SCTP allowed a remote attacker to cause a DoS
 (infinite recursion and crash) via a packet that contains two or more
 DATA fragments, which caused an skb pointer to refer back to itself
 when the full message is reassembled, leading to an infinite recursion
 in the sctp_skb_pull function (CVE-2006-2274).
 
 The dvd_read_bca function in the DVD handling code assigns the wrong
 value to a length variable, which could allow local users to execute
 arbitrary code via a crafted USB storage device that triggers a buffer
 overflow (CVE-2006-2935).
 
 Prior to 2.6.17, the ftdi_sio driver could allow local users to cause
 a DoS (memory consumption) by writing more data to the serial port than
 the hardware can handle, causing the data to be queued (CVE-2006-2936).
 
 The 2.6 kernel, when using both NFS and EXT3, allowed remote attackers
 to cause a DoS (file system panic) via a crafted UDP packet with a V2
 lookup procedure that specifies a bad file handle (inode number),
 triggering an error and causing an exported directory to be remounted
 read-only (CVE-2006-3468).
 
 The 2.6 kernel's SCTP was found to cause system crashes and allow for
 the possibility of local privilege escalation due to a bug in the
 get_user_iov_size() function that doesn't properly handle overflow when
 calculating the length of iovec (CVE-2006-3745).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0554
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1863
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2274
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3468
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 9d14c43145beafb4e63fe8cae758d0f6  corporate/3.0/RPMS/kernel-2.6.3.35mdk-1-1mdk.i586.rpm
 e7331f51ed5cf4edee33efcb01f49243  corporate/3.0/RPMS/kernel-BOOT-2.6.3.35mdk-1-1mdk.i586.rpm
 dcb027450192d7d73f407f30d3e3e852  corporate/3.0/RPMS/kernel-enterprise-2.6.3.35mdk-1-1mdk.i586.rpm
 59f29ace5cc862c84cace5d046d6302e  corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.35mdk-1-1mdk.i586.rpm
 6b062c5059587a927f31fea04fb91a3a  corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.35mdk-1-1mdk.i586.rpm
 744287198a20913bd38b1c1d37a68bd2  corporate/3.0/RPMS/kernel-secure-2.6.3.35mdk-1-1mdk.i586.rpm
 17780ad90f4989615baab5f115074f8a  corporate/3.0/RPMS/kernel-smp-2.6.3.35mdk-1-1mdk.i586.rpm
 4555bac09b7ce50d83b97c47af0b2724  corporate/3.0/RPMS/kernel-source-2.6.3-35mdk.i586.rpm
 7165754462cdfcd92c894f56623bc8b0  corporate/3.0/RPMS/kernel-source-stripped-2.6.3-35mdk.i586.rpm
 e59db387f0642f5293dc60283832557b  corporate/3.0/SRPMS/kernel-2.6.3.35mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 918a70fe836d900b217f442b5208c779  x86_64/corporate/3.0/RPMS/kernel-2.6.3.35mdk-1-1mdk.x86_64.rpm
 dd1ea77b15bd07c75f5ab7caf00dbde0  x86_64/corporate/3.0/RPMS/kernel-BOOT-2.6.3.35mdk-1-1mdk.x86_64.rpm
 c8964849f4142c2c51c3ddd298513753  x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.35mdk-1-1mdk.x86_64.rpm
 7a98664c4ba5f0d50a500c1158a8fb08  x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.35mdk-1-1mdk.x86_64.rpm
 3c4d5ca4f7a1a91d99fc182e499c9e76  x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-35mdk.x86_64.rpm
 a25c6705ba2b70c85c1c86e68cb0d3cd  x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-35mdk.x86_64.rpm
 e59db387f0642f5293dc60283832557b  x86_64/corporate/3.0/SRPMS/kernel-2.6.3.35mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 5cab4be7c19a67689f33f01de208879e  mnf/2.0/RPMS/kernel-2.6.3.35mdk-1-1mdk.i586.rpm
 ee1db88c9010b3a1af0f5ea93ce86505  mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.35mdk-1-1mdk.i586.rpm
 0e3618eec1dcb5bca817ecec7e912836  mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.35mdk-1-1mdk.i586.rpm
 ded09245567203340c86b3ddacf21b3a  mnf/2.0/RPMS/kernel-secure-2.6.3.35mdk-1-1mdk.i586.rpm
 7efdc84f2748f1c2237a72ef94d90b31  mnf/2.0/RPMS/kernel-smp-2.6.3.35mdk-1-1mdk.i586.rpm
 d12744fdab6bf6606ed13fae69b51f50  mnf/2.0/SRPMS/kernel-2.6.3.35mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFE7xa9mqjQ0CJFipgRAsAAAKC/kOcYUfcUldfx8MGy87CHigyjSgCeJ/43
JsyWup/H/+NRqjHU1SGHaGc=
=8KyZ
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F49019)

Ubuntu Security Notice 331-1 (PacketStormID:F49019)
2006-08-17 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,denial of service,overflow,arbitrary,kernel,local,root
linux,ubuntu
CVE-2006-2934,CVE-2006-2935,CVE-2006-2936
[点击下载]

Ubuntu Security Notice USN-331-1 - A Denial of service vulnerability was reported in iptables' SCTP conntrack module. On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash. A buffer overflow has been discovered in the dvd_read_bca() function. By inserting a specially crafted DVD, USB stick, or similar automatically mounted removable device, a local user could crash the machine or potentially even execute arbitrary code with full root privileges. The ftdi_sio driver for serial USB ports did not limit the amount of pending data to be written. A local user could exploit this to drain all available kernel memory and thus render the system unusable.

=========================================================== 
Ubuntu Security Notice USN-331-1            August 03, 2006
linux-source-2.6.15 vulnerabilities
CVE-2006-2934, CVE-2006-2935, CVE-2006-2936
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  linux-image-2.6.15-26-386                2.6.15-26.46
  linux-image-2.6.15-26-686                2.6.15-26.46
  linux-image-2.6.15-26-amd64-generic      2.6.15-26.46
  linux-image-2.6.15-26-amd64-k8           2.6.15-26.46
  linux-image-2.6.15-26-amd64-server       2.6.15-26.46
  linux-image-2.6.15-26-amd64-xeon         2.6.15-26.46
  linux-image-2.6.15-26-hppa32             2.6.15-26.46
  linux-image-2.6.15-26-hppa32-smp         2.6.15-26.46
  linux-image-2.6.15-26-hppa64             2.6.15-26.46
  linux-image-2.6.15-26-hppa64-smp         2.6.15-26.46
  linux-image-2.6.15-26-itanium            2.6.15-26.46
  linux-image-2.6.15-26-itanium-smp        2.6.15-26.46
  linux-image-2.6.15-26-k7                 2.6.15-26.46
  linux-image-2.6.15-26-mckinley           2.6.15-26.46
  linux-image-2.6.15-26-mckinley-smp       2.6.15-26.46
  linux-image-2.6.15-26-powerpc            2.6.15-26.46
  linux-image-2.6.15-26-powerpc-smp        2.6.15-26.46
  linux-image-2.6.15-26-powerpc64-smp      2.6.15-26.46
  linux-image-2.6.15-26-server             2.6.15-26.46
  linux-image-2.6.15-26-server-bigiron     2.6.15-26.46
  linux-image-2.6.15-26-sparc64            2.6.15-26.46
  linux-image-2.6.15-26-sparc64-smp        2.6.15-26.46

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Please note that Ubuntu 5.04 and 5.10 are also affected by these
flaws. An update is in preparation and will be released shortly.

Details follow:

A Denial of service vulnerability was reported in iptables' SCTP
conntrack module. On computers which use this iptables module, a
remote attacker could expoit this to trigger a kernel crash.
(CVE-2006-2934)

A buffer overflow has been discovered in the dvd_read_bca() function.
By inserting a specially crafted DVD, USB stick, or similar
automatically mounted removable device, a local user could crash the
machine or potentially even execute arbitrary code with full root
privileges. (CVE-2006-2935)

The ftdi_sio driver for serial USB ports did not limit the amount of
pending data to be written. A local user could exploit this to drain
all available kernel memory and thus render the system unusable.
(CVE-2006-2936)

Additionally, this update fixes a range of bugs.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.diff.gz
      Size/MD5:  2176265 7e58cd466b0806ef230dd7db1bb11410
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.dsc
      Size/MD5:     2379 d24f2db881c6169c9a1b8500ff413e5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-26.46_all.deb
      Size/MD5:  5159244 4bf4e66f6217bfe273208d9d2b12d2b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-26.46_all.deb
      Size/MD5:    88218 f9e5a58e908d0e64248e8a93df25cdda
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46_all.deb
      Size/MD5: 44519570 d74769581d9cbcaf46cec3982078cc20

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    22354 b46dd65aaa4f67a7b0c09c97ee669a88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    44766 b7d6d5a3ea9591159a386d50467a3209
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     2312 157bdcb2afb69c6ab737c911285634c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    36194 7a7ee0ba8f86095feb78a043eea3fc03
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   102030 8e0629b9b7a003f6f6e5bfdf30a8684d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    38614 e26a1ec7ab0ff9b0b1dbfbc4aeb79ac0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    49132 6a5e126a9e4a7a112b1669a967b2dbdb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   176752 f47339410f9371b8e62d3a882b68395c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    36768 3f47681286a0cb1d71e5a7ae72934213
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   142206 ca441b258ebe27b5f3e51344c8a75687
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    51042 ad5b0c1fcd5f74287a4b3c6c29fe4c9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   140418 2877bf985637d6bbe468ee168469e774
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   286894 cbbc43bfed10fe2845e181e13a31f45e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    97792 2aa91b5d3be5c27c7da4b8166fcf45d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1650194 148c14b6f3cc773a3493318b1b73f4b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-generic_2.6.15-26.46_amd64.deb
      Size/MD5:   863134 5e9c6139ac4cef1b4bf72c3ea9ba7c34
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-k8_2.6.15-26.46_amd64.deb
      Size/MD5:   859340 b058f2ce8ecf359289f878b006a784d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-server_2.6.15-26.46_amd64.deb
      Size/MD5:   865454 70d758e5e6c69fbce23fc310868d4a90
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-xeon_2.6.15-26.46_amd64.deb
      Size/MD5:   860588 06592191db1bfbe9b13a90b039314d28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_amd64.deb
      Size/MD5:  6909926 bad8cc44f50d9efc6e28e1705b0613b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-generic_2.6.15-26.46_amd64.deb
      Size/MD5: 20749454 9ce6df903e054cd8785ea9010bd8e2d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-k8_2.6.15-26.46_amd64.deb
      Size/MD5: 20729124 76af9b1873402a947978dfc297c4c769
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-server_2.6.15-26.46_amd64.deb
      Size/MD5: 21568390 ac3eec6f072a6defcf470b3068cb29e3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-xeon_2.6.15-26.46_amd64.deb
      Size/MD5: 19837954 28c26b35f0a1d6073aea751cc6a48e5f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    15622 2d71e8593af55bb6535286d928732c6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   240268 b087baa926d9f74b6d1115d2fe3f0484
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   202556 66a1b27f1fa3df831ac2aa61372b5a98
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1048598 6727cb9477f67ccd644d3cf9654996b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1468336 e87315f8380eba996f41430689645dab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   161646 35c8fa79d5cb7f84312344d70f3daf28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     9832 6d460e016e8caa9009e7c0100546765d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    80852 017f3b690a7deda79ae28859a1156f16
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    49166 482784e69d825679f716f588c9d08fb1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    35156 4e1d46d0ff65b856b46a645608148f18
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    70858 e762b6c646542ec7123d25d54ce039ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     6218 f6977d9be5d4e5b477757c61a316e2a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     9062 568e685568ee587ba271ecb2cf21752c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    57884 4740421160ab315dbb79dbe4a2a730f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   123326 a0519604867bcbd1d18d3a3be421056c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   100582 62da7b3eb3cdd096f3d53aaf902577d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    79198 e68d78108e5cdbe25718b393798e2264
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1594668 242186379984fa8716843f072eaa6587
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    72288 9dec0b23cfeea9b58fcac42d959ad514
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    12646 b28d65521fa1ec89824e4801aeef5bce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    33738 1a21457864b8cf9bbc4db127624102f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   138134 5d9cc11966e5af74bfff5173690e3564
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    38922 f25d8ca81d5e7a5a106d2e091fd365ed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   278740 7734d6570999a0f33fef87c11155cc33

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    18964 c76b9c09fa34cf0a218076ad9594eb67
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    43454 2213aea7eab3b198897b82632a505091
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   105200 f5e8536dd17c1e3d068363eedc2937cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     2280 2f497e2b47eed497583fdb8d5a3e0ce3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    34480 c353d6e2a33c49fab899b76210b15534
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    96798 1e5ae4943d47ba2da0fb4f75ce077413
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    37064 ef0e68a2ec1bf9e4ecdf13f8cbbe7fce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    44064 ff8196367f19565e1f4917c8cb20d805
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   167672 d65fcbcf877adce0b5fca9931cc099d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    33924 6cf55b4a822e3fa382c21da77305678c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   137840 69ca55a9e0fe2e4f32e213e4ec1d97f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    46886 4e9081c94f6cf7e40adf7c9e85af81df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   132754 492686dc37c65caedde06eaed3287d42
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   273462 924a7858e13147b6a7f89aab2b5c42f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   102250 5a3b5858bc762295a9da42602ac02637
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1594890 028bff5d335b8bab020e5d0678359554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-386_2.6.15-26.46_i386.deb
      Size/MD5:   856398 2962068982a4a35fc449914e453500d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-686_2.6.15-26.46_i386.deb
      Size/MD5:   852460 2f7e14af41df8e3f9d403f0967b46ab4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-k7_2.6.15-26.46_i386.deb
      Size/MD5:   857528 7b19ecc109a7f7632f655ff0b42b5e04
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server-bigiron_2.6.15-26.46_i386.deb
      Size/MD5:   858588 c5d09e3871e168316024f06482f26a05
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server_2.6.15-26.46_i386.deb
      Size/MD5:   856510 e6ecee80055f1d273cea08ae3a006d6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_i386.deb
      Size/MD5:  6902516 936d19f8917ae5e05224390595e1ca2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-386_2.6.15-26.46_i386.deb
      Size/MD5: 21654868 34f6cb028c963b8e5b01b479565662b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-686_2.6.15-26.46_i386.deb
      Size/MD5: 22447616 a3938cd9077bcb7b274f3d67cef547d4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-k7_2.6.15-26.46_i386.deb
      Size/MD5: 22188556 45c7695939ee428bb82bb6e448050361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server-bigiron_2.6.15-26.46_i386.deb
      Size/MD5: 23548214 fc515956f0d12c34223f14e41f911b35
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server_2.6.15-26.46_i386.deb
      Size/MD5: 23105394 daf8c174f33d7244ddbf1cc3a0e8dd68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    15498 f825991f4ba414c74ec1bac247ae36b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   238440 aabd5a975ab5631ca9f8f82cf38eecd8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   196960 d3438f31ff987f7905a82fa25e2209d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1048356 4701e9521d2361f9299fca5d60993c82
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1666448 d19c39a06d01fc4bf9eed4e0bb01b94b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   160814 dc17c3a40d0122c0274df2013fa57325
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     9160 b13026a2f8ad64d65a97a9b4aeed168a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    76484 b9b19266a950a275ad7984c891998608
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    53250 0ef970528317c905cda061d5ceb8fff1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    33052 da1a201964585fd53d0e349ef31648aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    85620 b4db6cb9cd152731247f292bc1a7cc2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     6024 c57b6ff6f47e37110466eaa52c696751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     8750 5f7d3f0d22778439a7998c0bcd5d6c4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    53588 8e25559416733be5bf2e720f4789977b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   130778 5029562b6e4f6571a586a5bc3cac5b84
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    98132 5b6cf1677c087d66c04a6f898d445816
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    77114 73e86308a339e3d75478677f85a93e85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1768386 b601477627d639daa1b091fe3935742c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    69560 eef217d0e9afe909ddaf058303928773
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    11760 bebc7362407bf0b2f0392f21066f1440
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    35998 da990a70e403bb59b92e61b7b5be6040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   132272 6ccf48f5e1dec0cab94178232fe63159
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    38540 d2486293363827702c707c39959e557c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   299112 975134de4d987c369854b18f029a41aa

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    23724 dd0a12c21a91303fee396d4d964efd7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    25942 883e8ffdc70f43c0474a4c2ab1b0e4fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    49308 2997c9edb91a59111a1df4348c612e59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    51520 369cbc45b6d39ac1740a79443ed0f972
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     2304 479deb640b1a243cd50190ed5f92194f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     2474 7c51c4a431564be19f73bd1495faaa9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    40116 c48dc950cc725cd29f2c73b7e1e27af6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    43682 219a8b33cd993282e630108d04c5f8bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   112348 988ff5c75718602266f20f00ffd09d74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   120422 00b3bb3094caea5d07c1bf99f62477e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    40848 42e0d687b2d6ab960b4136f3ae424550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    45348 09863e051631e4eeb93deecd6d54cd8c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    29020 4438cc82d10b90091d600e9cbcbee0cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    29890 947781ba5c4494d7eb978621a5390d83
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   211386 6b8a163f3717f793d9fd3fe37ee30c12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   225190 a26980d515e4d6c2471c47f6e9efaf34
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    45038 f41bff445c763d0d82773113102f2b5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    40210 2d15243f9b9156caaf16ee05ef7f5851
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     1926 cac1a938d57e96f855a680435dfea0ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     2194 98cf4cc7093771d6b5a486da248d63a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    80586 69f438fb3c31a136bddceb9fd8ef3c3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    85942 7c80c0648522bd9b4282413f1ad7308f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   111614 30ad839daae0d35ed646957210423f28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   125762 f2e2eddff8f87bf6f3e120de6697ea71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    53402 99e59c787dbdfd2b2b3f5ee3190a354b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    58472 227124201106cc2c6ea8543325a8fec5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   147642 8e3e2ede998441155d04fcd170071762
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   161422 113c01a206c4f2b9e0ea0595243a271f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   317478 415750c046f03ff3b3cb7840353f6bdb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   287574 e0e809bbfe42506f2d7622618462244a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   115850 a4c34e2dd7f593db3715135a36b4ea39
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   116516 36fc30755a349c8357931e6df9cf0005
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1922760 7ff8ffc6d32dbaac5e5389cb20fa3b91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  2434820 494ee46a173b063b1e4de24051c9e417
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc-smp_2.6.15-26.46_powerpc.deb
      Size/MD5:   867232 f27a2e6c82b101ee1196e2dc79235c0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc64-smp_2.6.15-26.46_powerpc.deb
      Size/MD5:   865916 f723587457a8052726c6332d978bf21d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc_2.6.15-26.46_powerpc.deb
      Size/MD5:   863582 48c2e803ec1a32d225ff015ca9dac8c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_powerpc.deb
      Size/MD5:  6934118 811e2c48ceb71e0b73b947383879e54e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc-smp_2.6.15-26.46_powerpc.deb
      Size/MD5: 22699770 454c92d672745825e0da59b3846ea296
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc64-smp_2.6.15-26.46_powerpc.deb
      Size/MD5: 23598248 caceeea9305708281ded48af53fdb035
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc_2.6.15-26.46_powerpc.deb
      Size/MD5: 22279522 7c51a4a1d9a7f4682dba55652c7a7177
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    17774 d2109fff6a3e76f8ae00ca50c3757ac6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    17380 3e925793e6cf5143bbb90c1cc7135ca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   261138 486f49750a441f9f08a9e028017859dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   282372 3532a606ebccbffe4e9f0b9704343403
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   227448 ab67a542a296c15fe19f5678bfb3abd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   248672 a642b4dc828b99a829e385c1272ffac5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1048444 693484f8e48f3ed96de600bcb263ff1d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1048586 e3e09ae489e9a42d080c7b659fcb9212
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1652058 d90ddda8561ab7c84721d9a2759410cf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1786880 82026dcc36bfb75aed01eea38663dec0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   250942 8c9a5ff088613dd58c085209574757f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   233664 5f12bc05b5caaa8e5cc8be471da67891
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    13030 f576434ce6007be2a958a5551c2222d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    13520 542d6c2824d61f80941e59cbb2d58ac0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    84830 12874bfa595ab09827548acbe045a377
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    52186 580497226f45e794919f37c09264f190
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    73926 2c1df413ca789def27ea7bb7b9ca2212
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    85838 ff8d5545cd5f32a2f0cf60e8e76f8efd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     6616 c07ed6e085d270ed204293c31b532616
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     7056 b2a3e5f16342ea8c06c4f3c9b8013927
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    60354 57bc73b870551aab386c5bd729ddcb06
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    70346 57a1efe04f64935279dab390e5574a14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   128542 29067c575f09689517acafdfd78fe888
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   157796 ba534f3a82b191acf6f55b2f08c1de4a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   107706 725f2666fcf5175d99dfa349cafeb4e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   125538 5edca118eb1d1ae86205b8f6d749c6c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    87246 c8dd762bd57a5f47d6dd84b300385143
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    93264 d210e9fa22278979c55f0b0c31438c7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  2013958 770fdbfcaa3fd6adf15471718d87d25c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1987990 e7fa61bdb4c7e774759c162550b26d81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   104106 13d152bc0bbed1042e38a26159887a80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   115690 cc469ae29ca3b83ecbf894720f1006e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    12736 3a50330a030869bff6c7f64607ed9bc7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    14434 d6feff4e81decd9cfc8fd802d597e0ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    39946 d83aab7883626c06c246016d8b6b5c4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    41464 ad6679188388ae6763c489ab7a61455a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   148964 d16936d026ac05ea527535911fa7631a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   167622 8591041dbb8669e645c62d96d98cf37b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    42268 448f836bf93210a77a8ffa0c6e703800
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    44856 5646582a22b27fad6e49ce9e1bd42a44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   320286 80c77c84a1c9aa91c9f455557f587cce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   324710 2290e406789e3c8226fbddb9738c95ca

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    50458 875448e1f1b524a0cd156c433ad2f182
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     2358 9e082f4706f2e58348fb4c7fc07c6cb2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    40236 264830e60e3acf6da02eee2b796df6bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   110300 de7f78d3e25943233e566b9c81c5dc9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    40722 15875a4574ee354f096a01875a05626c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   104226 2ebf691549e08488b083c3426f4529f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     7430 6da2cdc9dfa3d2029b1bb38653ce1160
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   148788 3a394409c70af60eb315728785d71d4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1707378 c74b91b4e6e534abfee6c48223f1cc0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64-smp_2.6.15-26.46_sparc.deb
      Size/MD5:   763904 01db8ad2865348d766cd8f980aa1dec8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64_2.6.15-26.46_sparc.deb
      Size/MD5:   763362 97689f69f840a582b6accad44da2da10
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_sparc.deb
      Size/MD5:  6947988 21f2e798c2ca60c611e9bdb4d4a46a92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64-smp_2.6.15-26.46_sparc.deb
      Size/MD5: 14933382 7294c7f5961809e0859c7ed68b2f2ad1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64_2.6.15-26.46_sparc.deb
      Size/MD5: 14755230 25638ac8ff3ee3729aa21ded2806dd32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     7418 b6f12641e9c07fbb53753ec9e7b74e08
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   248512 68377b888b50bb1c2242cae243e40d94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   212272 82eb90e54dc8dab248c79a1bf65ef463
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1048464 85e7d26f45c8b60a243a056481fcec65
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1398990 a77e897a9b8ae4ab6e532118751a696d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    10124 a45e2d6ef98f3dce1b11193bc45216b7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    40174 abde0b7d708426b354656402819cabdc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     9358 b5a4522ef7a12b59ce2a2576dc1f211f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    61430 1240de3c53b56a668596f4fc260c60ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   163004 b4043645767fab694cca73be48ecdd8c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    63930 29523cd8e6d0acee2bdfa74f056ba665
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1235036 6e4978f60c91911ceb238ab041f616c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    59314 5ebc9851899f4eac5d201bd5dd082c19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    37392 53c475ecafc31e68286a2d28b4fd98e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   280070 971953c63a5c968257c08d9dc280ee2a
    

- 漏洞信息

27119
Linux Kernel ftdi_sio Serial Port Data Saturation Local DoS
Local Access Required Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

The Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered because the 'ftdi_sio' serial driver cannot handle data at the rate it can be queued for, which may lead to consumption of all system memory resulting in loss of availability for the platform.

- 时间线

2006-07-04 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.6.16.27 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Linux Kernel USB Driver Data Queue Local Denial of Service Vulnerability
Design Error 19033
No Yes
2006-07-18 12:00:00 2007-06-15 04:39:00
Ian Abbott discovered this issue.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 sparc
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS sparc
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
SuSE SUSE Linux Enterprise Server 10
SuSE SUSE Linux Enterprise Desktop 10
S.u.S.E. openSUSE 10.2
S.u.S.E. Open-Enterprise-Server 0
S.u.S.E. Novell Linux POS 9
S.u.S.E. Novell Linux Desktop 9
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Enterprise Server 10
+ Linux kernel 2.6.5
S.u.S.E. Linux 9.3 x86-64
S.u.S.E. Linux 9.3 x86
S.u.S.E. Linux 10.1 x86-64
S.u.S.E. Linux 10.1 x86
S.u.S.E. Linux 10.1 ppc
S.u.S.E. Linux 10.0 x86-64
S.u.S.E. Linux 10.0 x86
S.u.S.E. Linux 10.0 ppc
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.17 .5
Linux kernel 2.6.17 .4
Linux kernel 2.6.17 .3
Linux kernel 2.6.17 .1
Linux kernel 2.6.17 -rc5
Linux kernel 2.6.17
Linux kernel 2.6.17
Linux kernel 2.6.17
Linux kernel 2.6.16 13
Linux kernel 2.6.16 .9
Linux kernel 2.6.16 .8
Linux kernel 2.6.16 .7
Linux kernel 2.6.16 .5
Linux kernel 2.6.16 .4
Linux kernel 2.6.16 .3
Linux kernel 2.6.16 .23
Linux kernel 2.6.16 .21
Linux kernel 2.6.16 .2
Linux kernel 2.6.16 .19
Linux kernel 2.6.16 .18
Linux kernel 2.6.16 .17
Linux kernel 2.6.16 .16
Linux kernel 2.6.16 .12
Linux kernel 2.6.16 .11
Linux kernel 2.6.16 .1
Linux kernel 2.6.16 -rc1
Linux kernel 2.6.16
Linux kernel 2.6.15 .6
Linux kernel 2.6.15 .4
Linux kernel 2.6.15 .3
Linux kernel 2.6.15 .2
Linux kernel 2.6.15 .1
Linux kernel 2.6.15 -rc6
Linux kernel 2.6.15 -rc5
Linux kernel 2.6.15 -rc4
Linux kernel 2.6.15 -rc3
Linux kernel 2.6.15 -rc2
Linux kernel 2.6.15 -rc1
Linux kernel 2.6.15
Linux kernel 2.6.14 .5
Linux kernel 2.6.14 .4
Linux kernel 2.6.14 .3
Linux kernel 2.6.14 .2
Linux kernel 2.6.14 .1
Linux kernel 2.6.14 -rc4
Linux kernel 2.6.14 -rc3
Linux kernel 2.6.14 -rc2
Linux kernel 2.6.14 -rc1
Linux kernel 2.6.14
Linux kernel 2.6.13 .4
Linux kernel 2.6.13 .3
Linux kernel 2.6.13 .2
Linux kernel 2.6.13 .1
Linux kernel 2.6.13 -rc7
Linux kernel 2.6.13 -rc6
Linux kernel 2.6.13 -rc4
Linux kernel 2.6.13 -rc1
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.12
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.6.15.5
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 CM 3.1
Avaya S8700 CM 3.1
Avaya S8500 CM 3.1
Avaya S8300 CM 3.1
Linux kernel 2.6.16 27

- 不受影响的程序版本

Linux kernel 2.6.16 27

- 漏洞讨论

The Linux kernel is prone to a local denial-of-service vulnerability. This issue is due to a design error in the USB FTDI SIO driver.

This vulnerability allows local users to consume all available memory resources, denying further service to legitimate users.

This issue affects Linux kernel versions prior to 2.6.16.27.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Linux kernel version 2.6.16.27 is available to address this issue.

Another patch addressing this issue was introduced in Linux kernel version 2.6.17.7. The new fix reportedly corrects several errors and possibly inefficiencies in the previous fix.

Please see the references for more information and vendor advisories.


S.u.S.E. Linux 10.1 x86-64

S.u.S.E. Linux 10.1 x86

Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test10

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

Linux kernel 2.6.11 -rc3

Linux kernel 2.6.11 .11

Linux kernel 2.6.11 .7

Linux kernel 2.6.12 .4

Linux kernel 2.6.12 .1

Linux kernel 2.6.12 -rc4

Linux kernel 2.6.12 .2

Linux kernel 2.6.12 -rc1

Linux kernel 2.6.13 -rc4

Linux kernel 2.6.14 .4

Linux kernel 2.6.14 .1

Linux kernel 2.6.14 .3

Linux kernel 2.6.14 -rc2

Linux kernel 2.6.14 .5

Linux kernel 2.6.15 -rc6

Linux kernel 2.6.15

Linux kernel 2.6.15 -rc1

Linux kernel 2.6.15 -rc3

Linux kernel 2.6.15 .4

Linux kernel 2.6.15 -rc4

Linux kernel 2.6.15 .6

Linux kernel 2.6.16 .3

Linux kernel 2.6.16 .9

Linux kernel 2.6.16 .5

Linux kernel 2.6.16 .1

Linux kernel 2.6.16 .23

Linux kernel 2.6.16 -rc1

Linux kernel 2.6.16

Linux kernel 2.6.16 13

Linux kernel 2.6.17

Linux kernel 2.6.17 .5

Linux kernel 2.6.17 .1

Linux kernel 2.6.17 -rc5

Linux kernel 2.6.2

Linux kernel 2.6.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站