Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerability
BID:13267
Info
Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerability
| Bugtraq ID: | 13267 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: |
CVE-2005-1041 |
| Remote: | No |
| Local: | Yes |
| Published: | Apr 19 2005 12:00AM |
| Updated: | Jul 12 2009 02:06PM |
| Credit: | This vulnerability was announced by the vendor. |
| Vulnerable: |
Ubuntu Ubuntu Linux 5.0 4 powerpc Ubuntu Ubuntu Linux 5.0 4 i386 Ubuntu Ubuntu Linux 5.0 4 amd64 Ubuntu Ubuntu Linux 4.1 ppc Ubuntu Ubuntu Linux 4.1 ia64 Ubuntu Ubuntu Linux 4.1 ia32 SuSE SUSE Linux Enterprise Server 8 SuSE Linux Enterprise Server 9 SuSE Linux Desktop 1.0 S.u.S.E. UnitedLinux 1.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64 S.u.S.E. Linux Professional 9.2 S.u.S.E. Linux Professional 9.1 x86_64 S.u.S.E. Linux Professional 9.1 S.u.S.E. Linux Professional 9.0 x86_64 S.u.S.E. Linux Professional 9.0 S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 9.0 x86_64 S.u.S.E. Linux Personal 9.0 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux AS 4 Redhat Desktop 4.0 Mandriva Linux Mandrake 10.0 AMD64 Mandriva Linux Mandrake 10.0 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 Linux kernel 2.6.9 Linux kernel 2.6.8 rc3 Linux kernel 2.6.8 rc2 Linux kernel 2.6.8 rc1 Linux kernel 2.6.8 Linux kernel 2.6.7 rc1 Linux kernel 2.6.7 Linux kernel 2.6.6 rc1 Linux kernel 2.6.6 Linux kernel 2.6.5 Linux kernel 2.6.4 Linux kernel 2.6.3 Linux kernel 2.6.2 Linux kernel 2.6.1 -rc2 Linux kernel 2.6.1 -rc1 Linux kernel 2.6.1 Linux kernel 2.6 .10 Linux kernel 2.6 -test9-CVS Linux kernel 2.6 -test9 Linux kernel 2.6 -test8 Linux kernel 2.6 -test7 Linux kernel 2.6 -test6 Linux kernel 2.6 -test5 Linux kernel 2.6 -test4 Linux kernel 2.6 -test3 Linux kernel 2.6 -test2 Linux kernel 2.6 -test11 Linux kernel 2.6 -test10 Linux kernel 2.6 -test1 Linux kernel 2.6 |
| Not Vulnerable: | |
Discussion
Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerability
A local denial-of-service vulnerability affects the Linux kernel.
A local attacker may leverage this issue to cause an affected Linux kernel to panic, effectively denying service to legitimate users.
Although only the Linux kernel version 2.6.9 is reported vulnerable, other versions are likely vulnerable as well.
A local denial-of-service vulnerability affects the Linux kernel.
A local attacker may leverage this issue to cause an affected Linux kernel to panic, effectively denying service to legitimate users.
Although only the Linux kernel version 2.6.9 is reported vulnerable, other versions are likely vulnerable as well.
Exploit / POC
Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Solution / Fix
Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerability
Solution:
Please see the referenced advisories for details on obtaining and applying updates.
Linux kernel 2.6.4
Linux kernel 2.6.8 rc1
Linux kernel 2.6.8
Solution:
Please see the referenced advisories for details on obtaining and applying updates.
Linux kernel 2.6.4
-
SuSE k_deflt-2.4.21-303.x86_64.rpm
SuSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_deflt-2.4.2 1-303.x86_64.rpm -
SuSE k_smp-2.4.21-303.x86_64.rpm
SuSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_smp-2.4.21- 303.x86_64.rpm -
SuSE kernel-bigsmp-2.6.5-7.202.7.i586.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6 .5-7.202.7.i586.rpm -
SuSE kernel-default-2.6.5-7.202.7.i586.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2. 6.5-7.202.7.i586.rpm -
SuSE kernel-default-2.6.5-7.202.7.x86_64.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-defaul t-2.6.5-7.202.7.x86_64.rpm -
SuSE kernel-docs-2.6.5-7.202.7.noarch.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6 .5-7.202.7.noarch.rpm -
SuSE kernel-smp-2.6.5-7.202.7.i586.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5- 7.202.7.i586.rpm -
SuSE kernel-smp-2.6.5-7.202.7.x86_64.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2. 6.5-7.202.7.x86_64.rpm -
SuSE kernel-source-2.4.21-303.x86_64.rpm
SuSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/kernel-source -2.4.21-303.x86_64.rpm -
SuSE kernel-source-2.6.5-7.202.7.i586.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6 .5-7.202.7.i586.rpm -
SuSE kernel-source-2.6.5-7.202.7.x86_64.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source -2.6.5-7.202.7.x86_64.rpm -
SuSE kernel-syms-2.6.5-7.202.7.i586.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5 -7.202.7.i586.rpm -
SuSE kernel-syms-2.6.5-7.202.7.x86_64.rpm
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2 .6.5-7.202.7.x86_64.rpm
Linux kernel 2.6.8 rc1
-
Ubuntu linux-doc-2.6.8.1_2.6.8.1-16.8_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-doc-2.6.8.1_2.6.8.1-16.8_all.deb -
Ubuntu linux-source-2.6.8.1_2.6.8.1-16.8_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-source-2.6.8.1_2.6.8.1-16.8_all.deb
Linux kernel 2.6.8
-
SuSE Intel-536ep-4.69-5.12.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69- 5.12.i586.rpm -
SuSE kernel-bigsmp-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6 .8-24.19.i586.rpm -
SuSE kernel-bigsmp-nongpl-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-non gpl-2.6.8-24.19.i586.rpm -
SuSE kernel-default-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2. 6.8-24.19.i586.rpm -
SuSE kernel-default-2.6.8-24.19.x86_64.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default- 2.6.8-24.19.x86_64.rpm -
SuSE kernel-default-nongpl-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-no ngpl-2.6.8-24.19.i586.rpm -
SuSE kernel-default-nongpl-2.6.8-24.19.x86_64.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default- nongpl-2.6.8-24.19.x86_64.rpm -
SuSE kernel-docs-2.6.8-24.19.noarch.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6 .8-24.19.noarch.rpm -
SuSE kernel-smp-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8- 24.19.i586.rpm -
SuSE kernel-smp-2.6.8-24.19.x86_64.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6. 8-24.19.x86_64.rpm -
SuSE kernel-smp-nongpl-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl -2.6.8-24.19.i586.rpm -
SuSE kernel-smp-nongpl-2.6.8-24.19.x86_64.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nong pl-2.6.8-24.19.x86_64.rpm -
SuSE kernel-source-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6 .8-24.19.i586.rpm -
SuSE kernel-source-2.6.8-24.19.x86_64.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2 .6.8-24.19.x86_64.rpm -
SuSE kernel-syms-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8 -24.19.i586.rpm -
SuSE kernel-syms-2.6.8-24.19.x86_64.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6 .8-24.19.x86_64.rpm -
SuSE kernel-um-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-2 4.19.i586.rpm -
SuSE kernel-um-nongpl-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl- 2.6.8-24.19.i586.rpm -
SuSE ltmodem-8.31a8-6.12.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6. 12.i586.rpm -
SuSE um-host-install-initrd-1.0-48.11.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-i nitrd-1.0-48.11.i586.rpm -
SuSE um-host-kernel-2.6.8-24.19.i586.rpm
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2. 6.8-24.19.i586.rpm -
SUSE ltmodem-8.31a8-6.11.i586.rpm
SUSE Linux 9.2
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6. 11.i586.rpm -
Ubuntu linux-doc-2.6.8.1_2.6.8.1-16.18_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-doc-2.6.8.1_2.6.8.1-16.18_all.deb -
Ubuntu linux-headers-2.6.8.1-5-386_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-386_2.6.8.1-16.18_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.18_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-686_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-686_2.6.8.1-16.18_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.18_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-k7_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-k7_2.6.8.1-16.18_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power3_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power3_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power4_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power4_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.18_i386.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-386_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-386_2.6.8.1-16.18_i386.deb -
Ubuntu linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-686-smp_2.6.8.1-16.18_i386.deb -
Ubuntu linux-image-2.6.8.1-5-686_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-686_2.6.8.1-16.18_i386.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.18_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.18_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.18_i386.deb -
Ubuntu linux-image-2.6.8.1-5-k7_2.6.8.1-16.18_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-k7_2.6.8.1-16.18_i386.deb -
Ubuntu linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power3_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power3_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power4_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power4_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.18_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-powerpc_2.6.8.1-16.18_powerpc.deb -
Ubuntu linux-patch-debian-2.6.8.1_2.6.8.1-16.18_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-patch-debian-2.6.8.1_2.6.8.1-16.18_all.deb -
Ubuntu linux-source-2.6.8.1_2.6.8.1-16.18_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-source-2.6.8.1_2.6.8.1-16.18_all.deb -
Ubuntu linux-tree-2.6.8.1_2.6.8.1-16.18_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-tree-2.6.8.1_2.6.8.1-16.18_all.deb
References
Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerability
References:
References: