Vulnerabilities > CVE-2005-3106 - Improper Locking vulnerability in multiple products

047910
CVSS 4.7 - MEDIUM
Attack vector
LOCAL
Attack complexity
HIGH
Privileges required
LOW
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
local
high complexity
linux
debian
canonical
CWE-667
nessus

Summary

Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Race Conditions via Symbolic Links
    This attack leverages the use of symbolic links (Symlinks) in order to write to sensitive files. An attacker can create a Symlink link to a target file not otherwise accessible to her. When the privileged program tries to create a temporary file with the same name as the Symlink link, it will actually write to the target file pointed to by the attackers' Symlink link. If the attacker can insert malicious content in the temporary file she will be writing to the sensitive file by using the Symlink. The race occurs because the system checks if the temporary file exists, then creates the file. The attacker would typically create the Symlink during the interval between the check and the creation of the temporary file.

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0101.NASL
    descriptionUpdated kernel packages that fix several security issues in the Red Hat Enterprise Linux 4 kernel are now available. This security advisory has been rated as having important security impact by the Red Hat Security Response Team. The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the security issues described below : - a flaw in network IGMP processing that a allowed a remote user on the local network to cause a denial of service (disabling of multicast reports) if the system is running multicast applications (CVE-2002-2185, moderate) - a flaw which allowed a local user to write to firmware on read-only opened /dev/cdrom devices (CVE-2004-1190, moderate) - a flaw in gzip/zlib handling internal to the kernel that may allow a local user to cause a denial of service (crash) (CVE-2005-2458, low) - a flaw in procfs handling during unloading of modules that allowed a local user to cause a denial of service or potentially gain privileges (CVE-2005-2709, moderate) - a flaw in the SCSI procfs interface that allowed a local user to cause a denial of service (crash) (CVE-2005-2800, moderate) - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed a local user to cause a denial of service (crash) (CVE-2005-3044, important) - a race condition when threads share memory mapping that allowed local users to cause a denial of service (deadlock) (CVE-2005-3106, important) - a flaw when trying to mount a non-hfsplus filesystem using hfsplus that allowed local users to cause a denial of service (crash) (CVE-2005-3109, moderate) - a minor info leak with the get_thread_area() syscall that allowed a local user to view uninitialized kernel stack data (CVE-2005-3276, low) - a flaw in mq_open system call that allowed a local user to cause a denial of service (crash) (CVE-2005-3356, important) - a flaw in set_mempolicy that allowed a local user on some 64-bit architectures to cause a denial of service (crash) (CVE-2005-3358, important) - a flaw in the auto-reap of child processes that allowed a local user to cause a denial of service (crash) (CVE-2005-3784, important) - a flaw in the IPv6 flowlabel code that allowed a local user to cause a denial of service (crash) (CVE-2005-3806, important) - a flaw in network ICMP processing that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3848, important) - a flaw in file lease time-out handling that allowed a local user to cause a denial of service (log file overflow) (CVE-2005-3857, moderate) - a flaw in network IPv6 xfrm handling that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3858, important) - a flaw in procfs handling that allowed a local user to read kernel memory (CVE-2005-4605, important) All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.
    last seen2020-06-01
    modified2020-06-02
    plugin id21977
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21977
    titleCentOS 4 : kernel (CESA-2006:0101)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2006:0101 and 
    # CentOS Errata and Security Advisory 2006:0101 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21977);
      script_version("1.21");
      script_cvs_date("Date: 2019/10/25 13:36:03");
    
      script_cve_id("CVE-2002-2185", "CVE-2004-1190", "CVE-2005-2458", "CVE-2005-2709", "CVE-2005-2800", "CVE-2005-3044", "CVE-2005-3106", "CVE-2005-3109", "CVE-2005-3276", "CVE-2005-3356", "CVE-2005-3358", "CVE-2005-3784", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-3857", "CVE-2005-3858", "CVE-2005-4605");
      script_xref(name:"RHSA", value:"2006:0101");
    
      script_name(english:"CentOS 4 : kernel (CESA-2006:0101)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated kernel packages that fix several security issues in the Red
    Hat Enterprise Linux 4 kernel are now available.
    
    This security advisory has been rated as having important security
    impact by the Red Hat Security Response Team.
    
    The Linux kernel handles the basic functions of the operating system.
    
    These new kernel packages contain fixes for the security issues
    described below :
    
      - a flaw in network IGMP processing that a allowed a
        remote user on the local network to cause a denial of
        service (disabling of multicast reports) if the system
        is running multicast applications (CVE-2002-2185,
        moderate)
    
      - a flaw which allowed a local user to write to firmware
        on read-only opened /dev/cdrom devices (CVE-2004-1190,
        moderate)
    
      - a flaw in gzip/zlib handling internal to the kernel that
        may allow a local user to cause a denial of service
        (crash) (CVE-2005-2458, low)
    
      - a flaw in procfs handling during unloading of modules
        that allowed a local user to cause a denial of service
        or potentially gain privileges (CVE-2005-2709, moderate)
    
      - a flaw in the SCSI procfs interface that allowed a local
        user to cause a denial of service (crash)
        (CVE-2005-2800, moderate)
    
      - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl
        that allowed a local user to cause a denial of service
        (crash) (CVE-2005-3044, important)
    
      - a race condition when threads share memory mapping that
        allowed local users to cause a denial of service
        (deadlock) (CVE-2005-3106, important)
    
      - a flaw when trying to mount a non-hfsplus filesystem
        using hfsplus that allowed local users to cause a denial
        of service (crash) (CVE-2005-3109, moderate)
    
      - a minor info leak with the get_thread_area() syscall
        that allowed a local user to view uninitialized kernel
        stack data (CVE-2005-3276, low)
    
      - a flaw in mq_open system call that allowed a local user
        to cause a denial of service (crash) (CVE-2005-3356,
        important)
    
      - a flaw in set_mempolicy that allowed a local user on
        some 64-bit architectures to cause a denial of service
        (crash) (CVE-2005-3358, important)
    
      - a flaw in the auto-reap of child processes that allowed
        a local user to cause a denial of service (crash)
        (CVE-2005-3784, important)
    
      - a flaw in the IPv6 flowlabel code that allowed a local
        user to cause a denial of service (crash)
        (CVE-2005-3806, important)
    
      - a flaw in network ICMP processing that allowed a local
        user to cause a denial of service (memory exhaustion)
        (CVE-2005-3848, important)
    
      - a flaw in file lease time-out handling that allowed a
        local user to cause a denial of service (log file
        overflow) (CVE-2005-3857, moderate)
    
      - a flaw in network IPv6 xfrm handling that allowed a
        local user to cause a denial of service (memory
        exhaustion) (CVE-2005-3858, important)
    
      - a flaw in procfs handling that allowed a local user to
        read kernel memory (CVE-2005-4605, important)
    
    All Red Hat Enterprise Linux 4 users are advised to upgrade their
    kernels to the packages associated with their machine architectures
    and configurations as listed in this erratum."
      );
      # https://lists.centos.org/pipermail/centos-announce/2006-January/012580.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?4839b252"
      );
      # https://lists.centos.org/pipermail/centos-announce/2006-January/012581.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?d8112949"
      );
      # https://lists.centos.org/pipermail/centos-announce/2006-January/012582.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ec839998"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected kernel packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel-hugemem");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel-hugemem-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel-smp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:kernel-smp-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2002/12/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2006/01/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/07/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-4", reference:"kernel-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"kernel-devel-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"kernel-doc-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"kernel-doc-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"kernel-hugemem-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"kernel-hugemem-devel-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"kernel-smp-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"kernel-smp-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"kernel-smp-devel-2.6.9-22.0.2.EL")) flag++;
    if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"kernel-smp-devel-2.6.9-22.0.2.EL")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel / kernel-devel / kernel-doc / kernel-hugemem / etc");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0101.NASL
    descriptionUpdated kernel packages that fix several security issues in the Red Hat Enterprise Linux 4 kernel are now available. This security advisory has been rated as having important security impact by the Red Hat Security Response Team. The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the security issues described below : - a flaw in network IGMP processing that a allowed a remote user on the local network to cause a denial of service (disabling of multicast reports) if the system is running multicast applications (CVE-2002-2185, moderate) - a flaw which allowed a local user to write to firmware on read-only opened /dev/cdrom devices (CVE-2004-1190, moderate) - a flaw in gzip/zlib handling internal to the kernel that may allow a local user to cause a denial of service (crash) (CVE-2005-2458, low) - a flaw in procfs handling during unloading of modules that allowed a local user to cause a denial of service or potentially gain privileges (CVE-2005-2709, moderate) - a flaw in the SCSI procfs interface that allowed a local user to cause a denial of service (crash) (CVE-2005-2800, moderate) - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed a local user to cause a denial of service (crash) (CVE-2005-3044, important) - a race condition when threads share memory mapping that allowed local users to cause a denial of service (deadlock) (CVE-2005-3106, important) - a flaw when trying to mount a non-hfsplus filesystem using hfsplus that allowed local users to cause a denial of service (crash) (CVE-2005-3109, moderate) - a minor info leak with the get_thread_area() syscall that allowed a local user to view uninitialized kernel stack data (CVE-2005-3276, low) - a flaw in mq_open system call that allowed a local user to cause a denial of service (crash) (CVE-2005-3356, important) - a flaw in set_mempolicy that allowed a local user on some 64-bit architectures to cause a denial of service (crash) (CVE-2005-3358, important) - a flaw in the auto-reap of child processes that allowed a local user to cause a denial of service (crash) (CVE-2005-3784, important) - a flaw in the IPv6 flowlabel code that allowed a local user to cause a denial of service (crash) (CVE-2005-3806, important) - a flaw in network ICMP processing that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3848, important) - a flaw in file lease time-out handling that allowed a local user to cause a denial of service (log file overflow) (CVE-2005-3857, moderate) - a flaw in network IPv6 xfrm handling that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3858, important) - a flaw in procfs handling that allowed a local user to read kernel memory (CVE-2005-4605, important) All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.
    last seen2020-06-01
    modified2020-06-02
    plugin id20732
    published2006-01-17
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/20732
    titleRHEL 4 : kernel (RHSA-2006:0101)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-922.NASL
    descriptionSeveral local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2004-2302 A race condition in the sysfs filesystem allows local users to read kernel memory and cause a denial of service (crash). - CVE-2005-0756 Alexander Nyberg discovered that the ptrace() system call does not properly verify addresses on the amd64 architecture which can be exploited by a local attacker to crash the kernel. - CVE-2005-0757 A problem in the offset handling in the xattr file system code for ext3 has been discovered that may allow users on 64-bit systems that have access to an ext3 filesystem with extended attributes to cause the kernel to crash. - CVE-2005-1265 Chris Wright discovered that the mmap() function could create illegal memory maps that could be exploited by a local user to crash the kernel or potentially execute arbitrary code. - CVE-2005-1761 A vulnerability on the IA-64 architecture can lead local attackers to overwrite kernel memory and crash the kernel. - CVE-2005-1762 A vulnerability has been discovered in the ptrace() system call on the amd64 architecture that allows a local attacker to cause the kernel to crash. - CVE-2005-1763 A buffer overflow in the ptrace system call for 64-bit architectures allows local users to write bytes into arbitrary kernel memory. - CVE-2005-1765 Zou Nan Hai has discovered that a local user could cause the kernel to hang on the amd64 architecture after invoking syscall() with specially crafted arguments. - CVE-2005-1767 A vulnerability has been discovered in the stack segment fault handler that could allow a local attacker to cause a stack exception that will lead the kernel to crash under certain circumstances. - CVE-2005-2456 Balazs Scheidler discovered that a local attacker could call setsockopt() with an invalid xfrm_user policy message which would cause the kernel to write beyond the boundaries of an array and crash. - CVE-2005-2458 Vladimir Volovich discovered a bug in the zlib routines which are also present in the Linux kernel and allows remote attackers to crash the kernel. - CVE-2005-2459 Another vulnerability has been discovered in the zlib routines which are also present in the Linux kernel and allows remote attackers to crash the kernel. - CVE-2005-2548 Peter Sandstrom noticed that snmpwalk from a remote host could cause a denial of service (kernel oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument. - CVE-2005-2801 Andreas Gruenbacher discovered a bug in the ext2 and ext3 file systems. When data areas are to be shared among two inodes not all information were compared for equality, which could expose wrong ACLs for files. - CVE-2005-2872 Chad Walstrom discovered that the ipt_recent kernel module on 64-bit processors such as AMD64 allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force. - CVE-2005-3105 The mprotect code on Itanium IA-64 Montecito processors does not properly maintain cache coherency as required by the architecture, which allows local users to cause a denial of service and possibly corrupt data by modifying PTE protections. - CVE-2005-3106 A race condition in the thread management may allow local users to cause a denial of service (deadlock) when threads are sharing memory and waiting for a thread that has just performed an exec. - CVE-2005-3107 When one thread is tracing another thread that shares the same memory map a local user could cause a denial of service (deadlock) by forcing a core dump when the traced thread is in the TASK_TRACED state. - CVE-2005-3108 A bug in the ioremap() system call has been discovered on the amd64 architecture that could allow local users to cause a denial of service or an information leak when performing a lookup of a non-existent memory page. - CVE-2005-3109 The HFS and HFS+ (hfsplus) modules allow local attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus. - CVE-2005-3110 A race condition in the ebtables netfilter module on an SMP system running under high load may allow remote attackers to cause a denial of service (crash). - CVE-2005-3271 Roland McGrath discovered that exec() does not properly clear posix-timers in multi-threaded environments, which results in a resource leak and could allow a large number of multiple local users to cause a denial of service by using more posix-timers than specified by the quota for a single user. - CVE-2005-3272 The kernel allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets. - CVE-2005-3273 The ioctl for the packet radio ROSE protocol does not properly verify the arguments when setting a new router, which allows attackers to trigger out-of-bounds errors. - CVE-2005-3274 A race condition on SMP systems allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired. - CVE-2005-3275 An error in the NAT code allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. - CVE-2005-3276 A missing memory cleanup in the thread handling routines before copying data into userspace allows a user process to obtain sensitive information. This update also contains a number of corrections for issues that turned out to have no security implication afterwards.
    last seen2020-06-01
    modified2020-06-02
    plugin id22788
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22788
    titleDebian DSA-922-1 : kernel-source-2.6.8 - several vulnerabilities
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-199-1.NASL
    descriptionA Denial of Service vulnerability was discovered in the sys_set_mempolicy() function. By calling the function with a negative first argument, a local attacker could cause a kernel crash. (CAN-2005-3053) A race condition was discovered in the handling of shared memory mappings with CLONE_VM. A local attacker could exploit this to cause a deadlock (Denial of Service) by triggering a core dump while waiting for a thread which had just performed an exec() system call. (CAN-2005-3106) A race condition was found in the handling of traced processes. When one thread was tracing another thread that shared the same memory map, a local attacker could trigger a deadlock (Denial of Service) by forcing a core dump when the traced thread was in the TASK_TRACED state. (CAN-2005-3107) A vulnerability has been found in the
    last seen2020-06-01
    modified2020-06-02
    plugin id20613
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20613
    titleUbuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-199-1)

Oval

accepted2013-04-29T04:18:16.431-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionRace condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
familyunix
idoval:org.mitre.oval:def:9108
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleRace condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
version26

Redhat

advisories
rhsa
idRHSA-2006:0101
rpms
  • kernel-0:2.6.9-22.0.2.EL
  • kernel-debuginfo-0:2.6.9-22.0.2.EL
  • kernel-devel-0:2.6.9-22.0.2.EL
  • kernel-doc-0:2.6.9-22.0.2.EL
  • kernel-hugemem-0:2.6.9-22.0.2.EL
  • kernel-hugemem-devel-0:2.6.9-22.0.2.EL
  • kernel-smp-0:2.6.9-22.0.2.EL
  • kernel-smp-devel-0:2.6.9-22.0.2.EL

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 15049 CVE(CAN) ID: CVE-2005-3053,CVE-2005-3106,CVE-2005-3107,CVE-2005-3108,CVE-2005-3109,CVE-2005-3110 Linux Kernel是开放源码操作系统Linux所使用的内核。 Linux Kernel中存在多个漏洞,具体如下: sys_set_mempolicy()函数中存在拒绝服务漏洞。本地攻击者可以通过以负数的第一参数调用函数导致kernel崩溃。(CAN-2005-3053) 在处理CLONE_VM的共享内存映射时存在竞争条件错误。本地攻击者可以在等待刚执行完exec()系统调用的线程时触发核心转储,导致拒绝服务。(CAN-2005-3106) 在处理跟踪进程时存在竞争条件。如果一个线程正在跟踪另一个共享相同内存映射的线程的话,本地攻击者就可以在跟踪的线程处于TASK_TRACED状态时强制核心转储,导致拒绝服务。(CAN-2005-3107) “ioremap”模块中存在安全漏洞。本地攻击者可以通过执行一些IO映射操作读取正常情况下不可访问的内存页,或导致kernel崩溃。这个漏洞仅影响amd64平台。(CAN-2005-3108) HFS和HFS+文件系统驱动不能正确的验证试图加载的文件系统是HFS/HFS+。如果机器允许用户以/etc/fstab项将任意可移动设备加载为HFS或HFS+的话,就可能利用这个漏洞触发kernel崩溃。(CAN-2005-3109) “ebtables”网络过滤模块中存在竞争条件。远程攻击者可以通过发送特制的报文来利用这个漏洞,导致在读取数值后锁定前修改数值,最终导致kernel崩溃。这个漏洞仅影响微处理器机器(SMP)。(CAN-2005-3110) 系统调用审计代码中存在内存泄漏漏洞。在启用了CONFIG_AUDITSYSCALL选项的kernel上,漏洞可能导致内存耗尽,最终导致拒绝服务。这个漏洞仅影响从kernel源码包改编的自定义kernel。 本地或远程攻击者可以利用这些漏洞导致拒绝服务,或读取敏感信息。 Linux kernel 2.6.x Linux ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www1.mandrivalinux.com/en/ftp.php3 target=_blank>http://www1.mandrivalinux.com/en/ftp.php3</a> Ubuntu也发布了漏洞补丁: Source archives: <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.24.diff.gz target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.24.diff.gz</a> Size/MD5: 3161214 a15ff03bcb00d4754245dd6078a70647 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.24.dsc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.24.dsc</a> Size/MD5: 2621 798aed5d9dcf66fa512074c3325b702a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz</a> Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84 Architecture independent packages: <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.24_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.24_all.deb</a> Size/MD5: 6164052 381b00e143461494891605903390554a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.24_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.24_all.deb</a> Size/MD5: 1517304 a17c7f62abcdab7c69082bd140ae9dad <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.24_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.24_all.deb</a> Size/MD5: 36728630 7ac3290d8ea6af7bb1036448d56cf878 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.24_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.24_all.deb</a> Size/MD5: 310048 434d3034b063170c80d6d8cdf42fd2b8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 249618 926387481ac459a2a48270e823a98b03 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 245164 051480f6b5619b789f8997a192c2b8ea <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 248546 bb2971b09991b075fa0c7cdc17b408eb <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 243648 e8d6318bd52497d43a290ce9b0ab9ad6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 3181212 352a78295a7194bdafa42636d021e053 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 14354678 96a00630d1e7c7336638859b3b562296 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 14830258 be3494d9b1f881e843162591cac07823 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 14866660 899c94b8efe954b683d731afe37ac6e5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.24_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.24_amd64.deb</a> Size/MD5: 14686626 bdcfc4b3c645c6b677315186c864a1c2 i386 architecture (x86 compatible Intel/AMD) <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.24_i386.deb</a> Size/MD5: 278620 46120675da2f8fb02f7e8f9dc4e0b394 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.24_i386.deb</a> Size/MD5: 274052 97171d2bb0b4740760e9558a2e7b724d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.24_i386.deb</a> Size/MD5: 276490 bebc12af5c91e45e5109fa7ad59c5e56 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.24_i386.deb</a> Size/MD5: 273972 66ddd0aa14c27d20fee23fc365584cbd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.24_i386.deb</a> Size/MD5: 276728 dd0c32677aa4159180d394212c911978 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.24_i386.deb</a> Size/MD5: 3221936 e21a8e46648122246f72f627eef8095c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.24_i386.deb</a> Size/MD5: 15498808 93020477209e697e94fcd95be8414370 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.24_i386.deb</a> Size/MD5: 16347906 102691bdac019a65c30963c36979ddff <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.24_i386.deb</a> Size/MD5: 16519854 56d39ef027bdf2ce5241e49716c1e171 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.24_i386.deb</a> Size/MD5: 16450868 5cc299c66617a10f4ae851053e1c1762 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.24_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.24_i386.deb</a> Size/MD5: 16575566 88bd6aa73ac7f271c4e1f8884da8d71e powerpc architecture (Apple Macintosh G3/G4/G5) <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 214496 689efea07a91ba0f24ea7f632c7a7d3a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 215420 9a61108803e63b33a265fc47b24f8ec3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 214468 b256b3c2fe4845be76c64e2e88db34e9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 215364 bcfe1219480dfcf2a341f0530e7aa653 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 214910 3d779958eeb84b1f435d178d24a1f702 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 217068 4d87c6cbbb08d213e4f5b12849f39603 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 3298984 d957e0f0f2ce627877b1bcfc7f6dd998 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 16371868 cb385e8ae526376fc7d6bad825b54609 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 15942040 1fb1a7e74711a06d7f2b273aa9dbdb76 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 16356698 7fbb181d8c95a44d5e8b192bc8e89cf9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 15934542 b55cd15e96553c854e1d9ccce16a1488 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 16293670 5a1a8a45dcb37d0168d32b2c2a9d2a89 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.24_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.24_powerpc.deb</a> Size/MD5: 15976280 bd8ac0a38d45af407d73a74d22bc5b20 Updated packages for Ubuntu 5.04: Source archives: <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.7.diff.gz target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.7.diff.gz</a> Size/MD5: 6093567 978c34f5cb5d3b72b3b4638ee1560b99 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.7.dsc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.7.dsc</a> Size/MD5: 3145 bc45925a61c3a639bd36202129d2eb90 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz</a> Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747 Architecture independent packages: <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.7_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.7_all.deb</a> Size/MD5: 6784844 c35600fab8aeab535322a3e757da5ebb <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.7_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.7_all.deb</a> Size/MD5: 37516250 33052919ca4160b85283ef63fecc7e1b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.7_all.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.7_all.deb</a> Size/MD5: 504358 c4d516bd11a8771369f709a7525d3bd6 amd64 architecture (Athlon64, Opteron, EM64T Xeon) <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 20820 b19c944c8548e77c39f57ed1c32ad40e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 47400 9b7439567be6f50ad763eccde02c66fa <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 88894 334f72e7b208182ea74896153f89cc24 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 30016 2f357d1de3d2c76363f0fc365238c13f <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 41236 7d20437c54de88c191f597efe53c7de6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 73596 e5c367e0d84b0484c747b39bd30e2318 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 5740 693c6901c315f8d9535ff6a625793f7a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 34852 3374401063b095662d99ad8f8ee650dd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 55180 c284e1dbfd05ceb83e67871c2d56e1c7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 112978 0872879fdd894971f1cdbda330175f68 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 40810 c65fad6c8902e8a5cae6c41ec9920a41 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 115708 e84280726c992c97b17196e66dfd38d7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 174632 bd3e664e99e878767098f33757b4f94a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 82590 6eb60c96c711e1fb1fee3beed9a3d55c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 1466824 6633dae0dac08bbf7af9b3169357106a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.7_amd64.deb</a> Size/MD5: 286188 89048c856b81a9dba6fd5ba0c5817f6a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.7_amd64.deb</a> Size/MD5: 283060 e6135af8822236c4ae55d0d74f37185c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.7_amd64.deb</a> Size/MD5: 285232 7a3dec17c02a3a75cd46639239f03fa3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.7_amd64.deb</a> Size/MD5: 280670 681e64a5d2c7c14a73501c8edf2198a1 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.7_amd64.deb</a> Size/MD5: 6137306 b32760115ea27749778b859f605c7103 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.7_amd64.deb</a> Size/MD5: 14576154 3393d69e23e9cdf8fde43736ab80cd61 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.7_amd64.deb</a> Size/MD5: 15121342 b15aa212ddd0002436787d920d4ce912 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.7_amd64.deb</a> Size/MD5: 15087780 633442d4e1d778616de74b6316b8e7e6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.7_amd64.deb</a> Size/MD5: 14962568 b67005d87cdcc16dafe494aa3805e6d2 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.7_amd64.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.7_amd64.deb</a> Size/MD5: 1356360 6d2d02db9de78b42d151b0e4fe1c5b17 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 14224 dbc7d1a6b2270819f71f6fc56b59ed35 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 178480 3e273f5df7380790e426b2371bb915fd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 174852 742e644b8ff2017f4bed2f307e66de78 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 731040 a472e127434688a7f523e24523e72ed4 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 780892 085a31aee27ab252088245023b00ca5b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 150024 c57604a2a38c0a41c161e5c3dd561b0f <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 168126 079a817f75e20c86826397c760a30139 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 9552 e3f893a6086a78b206d27c81e03d2138 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 94862 7facc0c19d400c35d6ecd7b687d91db5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 45728 c033646e8e19d8281f508954678120d8 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 33160 4e2b1b1d3a456c8d558bc47f7bc951ae <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 55284 552d215705829ac966b9cb370558b849 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 4658 68879104678668d4b877acd2a05ef7b4 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 7836 bc7667c2c29e60e3b7207691b0e765ea <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 53792 41c8c3c3fc5b0eec2f3f8ab79ce9b468 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 111106 5b9f9352372ba32e866cc86fd2088e63 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 10160 6efdee7ae3db7bad56b80b5351b748a5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 60450 f26bf4f93a4a41eb7d37af2c101df809 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 208566 8be404e63591be9a11eec0ee86140c9e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 69258 8870c16da7eab2e21a8cade3e1a5a847 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 394758 18d3d77de87a0f81dcb1591cc12a237d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 294478 cbd170236992ad73823c571cd502d448 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 12072 f0309978cf916d060e1a54fae09845b6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 22652 deae132d570aa2d6e82896d8885a5e75 <a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 28798 0449cb2e84a2e0dd45ca25840fe6853d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 56784 ef8528d4c8ba58034c37551890fd8e06 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 34934 ed98563865179eab76f5fac9fd77781b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.7_amd64.udeb</a> Size/MD5: 247460 915b25835380c35a37a03d5ece6ac986 i386 architecture (x86 compatible Intel/AMD) <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 18160 31cbd987b12efff4e5ece69e18b10b36 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 44828 274700c9f0e3703ee01b1749408842bd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 103042 74b3eb38f4dfda472ecdd08026079901 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 86004 b1cff8a97b67093eddf10487430ddf85 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 29088 40749880878bfc89b3b29be9267fd4fa <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 39772 dff8110ba0fc87c7317c55ce0be86016 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 71154 bea1913f860870841708fee06dd4a7d9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 5502 0fd456250906fca9ef60bd71b5b44d0c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 31582 6b6bbbe9203be1d531a12902a9208170 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 52940 3bc94a37b7507b86f1e3c5b5834c5eb7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 104454 7aab0ee001d6987b500656977c63c80a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 38628 2183bd28ba24c58ca9f02de2343d0f33 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 114512 4ba6628d10fc98c6bb8196e25bdd33d3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 190650 5a0ffeea1aece9b050c9dd2dbef64b09 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 86540 0f656de037acbbb885020b602f1b45cd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 1389414 921cbb5084aedecfbe5225e5ae1dcd1c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.7_i386.deb</a> Size/MD5: 314340 c759d72c9828af653c7400ce7065cf21 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.7_i386.deb</a> Size/MD5: 309904 1addb36376b36572d4261439292d1688 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.7_i386.deb</a> Size/MD5: 312292 4746e6afd8d838c0018200e02258e80b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.7_i386.deb</a> Size/MD5: 310382 ba769ea0744dc57011bbec3fc7d73218 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.7_i386.deb</a> Size/MD5: 312192 48832d3dee62cdf3a1b350041c59b939 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.7_i386.deb</a> Size/MD5: 6133852 ac70e6dd537d3c912de5510d3c8b76d6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.7_i386.deb</a> Size/MD5: 15612142 b9a6f2cac5c289fed2061e88ff6000ca <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.7_i386.deb</a> Size/MD5: 16189600 89eac5c391db9ce77a6a5a889b7a04b9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.7_i386.deb</a> Size/MD5: 16606650 2ffaa0da283235e395da8fc09b6d8e72 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.7_i386.deb</a> Size/MD5: 16295598 e30d5a176486d1c66965d38eb45e9613 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.7_i386.deb</a> Size/MD5: 16672398 a29cf81629d36eed1d2337d2aced3140 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.7_i386.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.7_i386.deb</a> Size/MD5: 1350238 b631861196615733aa956b1bcaa0807a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 14080 90e9309a4ca62badf6d4ca6f24efbdf5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 183172 776ca5da49ba2c3b5231e445629e47b9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 172740 8a938a321b3c9d38d565ed6a0e305924 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 967794 8dff00e6ae85dbce5c902959b9f87907 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 780678 2af7973a3b3c68de71a2ce36b480f058 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 140656 b6559e8b7738f9e3f24ec4948dd567a0 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 167956 4ae3951992317722d910fa451a812566 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 9338 0284ccea4143c35106acc1dcd1a1cea5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 89328 ca2c4d895714be8c7795dee65b93a8e4 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 48132 c47d6248dff026bce8c0b9f11f903381 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 30878 4d7a2a8fe99812397015c1575c76a3c6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 65888 c6c9fd85cdbb6a7119981668fc267b69 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 4502 6129e71cc7fe1c4551ee38d0a2661138 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 7752 4cd87da6322642c241a57b4f786827f9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 50772 bfe91a088bfccd5bd0d014a9986ec62d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 111588 fba5647a3e252958862a9704e9aa8d1e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 9894 da49bf7f7cfa2e76c8a2c897f44329ca <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 57154 7d9ae7cec61ca94748cc67d82a1fb190 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 241932 f136e468edb4070b508e183eccdcd362 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 66228 574233c2d5a34542ccd32c8deda0f0e5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 436522 4e3cd0c6331c2230c57262e8d4a6dc9b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 485674 41da802705e24b4f38eb9f159b6e2ae7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 11470 f6f487028c64340d2b1de33e839e630a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 21242 4c98a46eaac80ea8d1b8e749da05e30f <a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 29526 b7effce6cb172281591ee78a03b19db0 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 106146 961468fc47c9676e693c05b52c0ef33a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 33820 17cebc83d594fdf45eb7e46d288b1890 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.7_i386.udeb</a> Size/MD5: 261340 6a0cc4c73a4687311bae05ce6d283909 powerpc architecture (Apple Macintosh G3/G4/G5) <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 24050 5f6053b1d2a97f1f3ba2575b63025858 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 24054 072a49da3cb19cf4c00b48d53608942b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 24040 661aa54533b95b42af8d696e8c70ecb7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 58276 a6a8f745c07ab8331a6e2c902d150758 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 58278 3f8e11c7cf909f66e4988e4981a0f1ce <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 58260 b5b471d485f8d97e904f528814a18159 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 30280 e2eacc4fd794f3596eab7ffb7ebaccc0 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 30284 0b4018bc90b5434f1be29376cd98573d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 30260 2d13f9c222a5e963185f7b3829b82b20 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 109244 011334a51b4806f0c0b997730272f98d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 109242 2d119b0db4def531b26b36c82be66121 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 109222 9ebf8bdd05b4dfa6ffe10a7c2891e867 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 35380 78d85e79630d8ac57927fc4e97240207 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 35386 e3a0baa082c4c7d09d225eb248a90056 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 35380 2ed6083d59e09fca413cfb2d9c00fd82 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 30928 33974fa10683cea5ed62879fa0b27672 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 30932 7ad68e352eb1ff139f10714d39078dbe <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 30912 7a0af8dc7600f3db483350ed495bba42 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 212970 0a6493b76f16e16895b29a2caff2e256 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 212944 c50dbad8f2f206d78bf7f7e19d5f7b0a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 212926 69d46a318989bd231065bb858aa0ecfe <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 6162 88f7c149621e6d734539da47f86f74b6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 6166 0a3d0f0aafae722cb45afe56e615d179 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 6154 b13b79a9e53676fb7f085e2517d4e122 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 43430 0c90bc8599aecfae81229df36d797dfd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 43418 9b8896a42f3ba9937dd33c72fb91a085 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 43422 bfc1a82b3859fa0adf76e07ddf7abe1b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 4582 a5b0cd82502ca27499c23715f7fbb994 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 4582 37729d9267f77782396689d884aa8c1d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 4590 88f5b012453dcc8ef74c1ede21a26071 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 66042 f127b704389740f3c9aa86a98e794fc6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 66038 f0b6f579fe97a876ced5048004a30d43 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 66030 0dbca53ec0a02badc42ee5ebcbe4406e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 117110 4106d7ca6f648216cc55a3f87e3cfb7f <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 117100 780466eff2f25947a8aedb489d3369f4 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 116858 b3f5a2b5fd0819446747d8e46f8dedc4 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 66630 bf4b385bc89f495f38365751fca672b9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 66628 0bfa3f418a2f3f4d2ed4dcd0524566c4 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 66628 b90b954575aef85daecb26d3b43cf437 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 142074 8c6aa78ff6441521222d3f2ef3c9e517 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 142070 855985537fc4a436efd86b23b9123061 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 142072 652f0ac73bd0cdfa0aad5f5e0864184a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 213962 cd9b1d6a1cf7982d160167c536c699c3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 213980 c05dbc07b512c4c2aa43628cbca64492 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 213884 422d205259c9f3b7cce8622a56890b05 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 107002 1d9edb2e536b7ef30b0038acc961f44e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 107000 a83de67538474b39a3ea79dbb97ad2d6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 107008 bef5b46e389b3372cec843a1956dd2e9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 1866360 e693cc57c2e3ccd9e51d0c0bf90dd5e2 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 1870926 b688a4ac47fcec90d717cfeb7adec238 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 1900980 84c2b424ba1855b67edf63dd12a89fa3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.7_powerpc.deb</a> Size/MD5: 250036 2cca5e4d6dabcd5d49b6971124b210c9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.7_powerpc.deb</a> Size/MD5: 249452 fba0880d73c43ea8c7a53d5e205f4127 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.7_powerpc.deb</a> Size/MD5: 249710 b4dcceb6aae3bd84223d8e131220ce8a <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.7_powerpc.deb</a> Size/MD5: 249536 22783ed7a18c616c47011ffd4f3bd5e7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.7_powerpc.deb</a> Size/MD5: 250286 9a660b40576efdaa45f791a36a9000c6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.7_powerpc.deb</a> Size/MD5: 251000 9a8a89cd77e80e09045f5dbc034bff6b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.7_powerpc.deb</a> Size/MD5: 6155058 28e04fddb9c927e7b6c29f169b6460b2 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.7_powerpc.deb</a> Size/MD5: 15644018 c6645dfcb125031c7b0a63b8a309db95 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.7_powerpc.deb</a> Size/MD5: 15207668 b57660d7a92f9a2091c56560b39a1e04 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.7_powerpc.deb</a> Size/MD5: 15634182 91928bf7a25ee321feda0800fe8d605d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.7_powerpc.deb</a> Size/MD5: 15202978 ab54e9511c540186f4bb67b8290bc1f2 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.7_powerpc.deb</a> Size/MD5: 15550758 af1cea035238df9ad99553e4ff7ea0c2 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.7_powerpc.deb</a> Size/MD5: 15241996 30656702c643627497935258c562b794 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.7_powerpc.deb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.7_powerpc.deb</a> Size/MD5: 1351022 6fa2bb195d89b863384a05936e006b62 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 17356 784d04dd28c42ab24822b7498dcdeab0 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 17350 66b2db384fe1f4600a40befaa59fbfe6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 17350 0168ac9cf4c15c68b5d3bbb4344a920b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 213692 e48f795c8eaed1d69f6730c7f0661db7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 213702 aa64eeba0e32c3774a0a451a304e47b6 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 213450 0b69b79f0401c9064153bc72c4b4f84e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 210740 b216e5157fd4112d42906c2736d8ca13 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 210742 26a3d13fd8209dd359e357f4b647aa91 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 210742 bef313e3c3309f4f313f1c7848999bc3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 688410 f90615ce6b46487c9594cfcb9714a33c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 688366 441e0482ef62bba9318cddc0359ca217 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 686890 f5f2463cce30eaaad98b588be43fbd49 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 780774 7e6c96dafbf3e95ee3e31faf1925c765 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 780756 3a90b4c3b266dd78fc4c16bfd54518b8 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 780768 328c1a604d3e30d2629b347affa09bac <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 511230 e815b11ecce819249a48bbdcd8a78c29 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 511202 75156f4fde1e32c0a890e9b9e5fa334c <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 510828 63f9f315e62f375c0d45b7d4d2906ba1 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 257728 b390628503c76da7d64fed9e2c57704b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 257710 d58e51f1eea9c1c018880de1183def69 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 256848 15ff0127c4cc493304f3d0786c376dcf <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 84382 522bfdcd288a997ace95d94261f8c785 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 84376 0ba2664f1983f308753a168c0a6f3da3 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 84354 fdd1be0316e9502a5bbc69490cfce550 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 60978 7a13f03512ebc8eb10c109eb81e33220 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 60986 a4738eea8feb7c999990158cc2ebff87 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 60990 4bf4e01ece708f7386143aef92691e2d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 64998 00e202993dc788c81788d7d076fe3844 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 64980 0f85c0a8bbea6d1f71880ac5ddff3314 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 64984 104dca73804c1edc2562d57f03bfd991 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 5380 3a921afc2d343b6fa4f04c7ad26aaa66 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 5372 2ade6485239da6e0379e95534002a172 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 5370 75f12e7a610ae5e8196d700893a26aab <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 63272 3e987db7c39d1c139c059e52f4aed782 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 63272 f872447bd20aa5f3fa39edf582e24454 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 63236 48601833c1ae6842d10430eafdfeadc7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 131646 9a5b3ca00b46be9320035e52d2f85c90 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 131642 0d5034c54da6caf545e7b1c210e5d84f <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 131664 f72ddcd62f33f3d861c320997c2783db <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 70976 fdaa62ef91f5b6b4d9077d9fb4a052a2 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 70978 a28bd5df6f844fb8e103f435440f3b52 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 70962 d90b7736c4b82450302489e56f34f513 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 357324 26edca9c9e07b17ae593374eb9f36ac8 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 357308 6ead58f29f1f0a46a3ec1c677fb2d3d1 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 357320 7b3a9783b31ca225fe7a6b44bc9051df <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 80736 60b317e1bf56d9aee06df7bda98f47af <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 80736 8a36a14f8453312fc588924c0979acd8 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 80732 d80bddbed2f580cd7d8025577ddefaff <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 510998 fa4414692a1c4a9cf30020d9ad823ec5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 510950 f900e56af33f370f9fb9d1095b9217b5 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 510766 87e9163c1d6731763a97a37778539ecd <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 389140 58caaa87a8571c0ccc29f747046c99e9 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 389100 77d7895bc8e494fececb0e81effc03f0 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 389000 f6dd7fd3974b42404c29c610c417d643 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 63152 a2e8662304140575a184bca70fefea12 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 63152 0408d1f19972bb83dedaf8caaab55d01 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 63036 22a671d2207641366e664084c5f8032e <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 23348 95d7288a801c2f515c88cdb39b2b129f <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 23340 a8a5fb94340b24c10749d405d73c7023 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 23108 b5b591574bee1917eee306c1110da9ed <a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 35378 f3ea3b8b4336f3fbd1fdb1c8efeb54bc <a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 35380 772e8f0d72f0d780d5da9919b1ec5137 <a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 35376 de81c9280189fd79750fe3e890b1f401 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 135020 2907025388dd786a40b6d253e4a50f39 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 135008 f135174965482caabca198d3b8000c47 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 134990 be1926323f93ca0e1225a42587b571f7 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 42398 d69853b143860fcee2ca8253e176435b <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 42394 25c42cf169327556ce7eb1e51ccd1b2d <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 42400 2008f4c533e92a0947a439ab866d7228 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 294746 18ba36f838e3a89cc719795dc771daee <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 294742 6d111ff3e9ef5d71562505649a8c6c40 <a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.7_powerpc.udeb</a> Size/MD5: 294744 33dc5854a4875262a89b0bc6e7401790 RedHat ------ RedHat已经为此发布了安全公告(RHSA-2006:0101-01和RHSA-2005:808-01)以及相应补丁: RHSA-2006:0101-01:Important: kernel security update 链接:<a href=http://lwn.net/Alerts/168077/?format=printable target=_blank>http://lwn.net/Alerts/168077/?format=printable</a> RHSA-2005:808-01:Important: kernel security update 链接:<a href=http://lwn.net/Alerts/157420/?format=printable target=_blank>http://lwn.net/Alerts/157420/?format=printable</a>
idSSV:4212
last seen2017-11-19
modified2006-08-17
published2006-08-17
reporterRoot
titleLinux Kernel多个安全漏洞