Vulnerability Name:

CVE-2003-0127 (CCN-11553)

Assigned:2003-03-17
Published:2003-03-17
Updated:2018-05-03
Summary:The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CALDERA
Type: UNKNOWN
CSSA-2003-020.0

Source: CCN
Type: SCO Security Advisory CSSA-2003-020.0
OpenLinux: kernel kmod/ptrace root exploit

Source: CCN
Type: BugTraq Mailing List, Mon Mar 17 2003 - 10:15:03 CST
Ptrace hole / Linux 2.2.25

Source: VULNWATCH
Type: UNKNOWN
20030317 Fwd: Ptrace hole / Linux 2.2.25

Source: MITRE
Type: CNA
CVE-2003-0127

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:618
kernel

Source: ENGARDE
Type: UNKNOWN
ESA-20030515-017

Source: CCN
Type: RHSA-2003-088
New kernel 2.2 packages fix vulnerabilities

Source: REDHAT
Type: UNKNOWN
RHSA-2003:088

Source: CCN
Type: RHSA-2003-098
Updated 2.4 kernel fixes vulnerability

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:098

Source: CCN
Type: RHSA-2003-103
kernel security update

Source: CCN
Type: RHSA-2003-135
Updated 2.4 kernel fixes USB storage

Source: CCN
Type: RHSA-2003-145
Updated kernel fixes security vulnerabilities and updates drivers

Source: CCN
Type: RHSA-2003-190
Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200303-17

Source: CCN
Type: Sun Alert ID: 52081
On Sun Linux and Cobalt Legacy Products, an Unauthorized Local User May be Able to Gain Root Access Rights Due to an Issue With The ptrace() Function

Source: CCN
Type: Sun Alert ID: 55660
On Sun Linux and Cobalt Legacy Products, an Unauthorized Local User May be Able to Gain Root Access Rights Due to an Issue With The ptrace() Function

Source: CCN
Type: CIAC Information Bulletin N-056
Red Hat Updated 2.4 Kernel Fix for ptrace Vulnerability

Source: CCN
Type: CIAC Information Bulletin O-059
Debian Linux-Kernel-2.4.14-ia64 Vulnerabilities

Source: CCN
Type: CIAC Information Bulletin 0-127
Linux kernel Vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-270

Source: DEBIAN
Type: UNKNOWN
DSA-276

Source: DEBIAN
Type: UNKNOWN
DSA-311

Source: DEBIAN
Type: UNKNOWN
DSA-312

Source: DEBIAN
Type: UNKNOWN
DSA-332

Source: DEBIAN
Type: UNKNOWN
DSA-336

Source: DEBIAN
Type: UNKNOWN
DSA-423

Source: DEBIAN
Type: UNKNOWN
DSA-495

Source: DEBIAN
Type: DSA-270
linux-kernel-mips -- local privilege escalation

Source: DEBIAN
Type: DSA-276
linux-kernel-s390 -- local privilege escalation

Source: DEBIAN
Type: DSA-311
linux-kernel-2.4.18 -- several vulnerabilities

Source: DEBIAN
Type: DSA-312
kernel-patch-2.4.18-powerpc -- several vulnerabilities

Source: DEBIAN
Type: DSA-332
linux-kernel-2.4.17 -- several vulnerabilities

Source: DEBIAN
Type: DSA-336
linux-kernel-2.2.20 -- several vulnerabilities

Source: DEBIAN
Type: DSA-423
linux-kernel-2.4.17-ia64 -- several vulnerabilities

Source: DEBIAN
Type: DSA-495
linux-kernel-2.4.16-arm -- several vulnerabilities

Source: CCN
Type: US-CERT VU#628849
ptrace contains vulnerability allowing for local root compromise

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#628849

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20030318-009
several bug and security-related fixes

Source: CCN
Type: Guardian Digital Security Advisory ESA-20030515-017
several bug and security-related fixes

Source: CCN
Type: Gentoo Linux Security Announcement 200303-17
kernel ptrace flaw

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:038

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:039

Source: REDHAT
Type: UNKNOWN
RHSA-2003:103

Source: REDHAT
Type: UNKNOWN
RHSA-2003:145

Source: CCN
Type: BID-7112
Linux Kernel Privileged Process Hijacking Vulnerability

Source: CCN
Type: Trustix Secure Linux Security Advisory #2003-0007
Local root compromise

Source: CCN
Type: TLSA-2003-17
The ptrace is in vulnerability

Source: XF
Type: UNKNOWN
linux-ptrace-root-privileges(11553)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:254

Source: SUSE
Type: SUSE-SA:2003:021
kernel: local privilege escalation (ptrace/modprobe bug)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.4:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.13:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.15:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.16:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.17:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.21:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.22:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.23:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.24:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21::-pre1:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.13:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.15:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.16:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.17:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.21:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.22:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.23:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.24:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.4:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_4:*:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_xtr:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030127
    V
    CVE-2003-0127
    2015-11-16
    oval:org.mitre.oval:def:254
    V
    Linux Kernel ptrace Privilege Escalation Vulnerability
    2007-04-25
    oval:org.debian:def:495
    V
    several vulnerabilities
    2004-04-26
    oval:org.debian:def:423
    V
    several vulnerabilities
    2004-01-15
    oval:org.debian:def:336
    V
    several vulnerabilities
    2003-06-29
    oval:org.debian:def:332
    V
    several vulnerabilities
    2003-06-27
    oval:org.debian:def:312
    V
    several vulnerabilities
    2003-06-09
    oval:org.debian:def:311
    V
    several vulnerabilities
    2003-06-08
    oval:org.debian:def:276
    V
    local privilege escalation
    2003-04-03
    oval:org.debian:def:270
    V
    local privilege escalation
    2003-03-27
    BACK
    linux linux kernel 2.2.0
    linux linux kernel 2.2.1
    linux linux kernel 2.2.2
    linux linux kernel 2.2.3
    linux linux kernel 2.2.4
    linux linux kernel 2.2.5
    linux linux kernel 2.2.6
    linux linux kernel 2.2.7
    linux linux kernel 2.2.8
    linux linux kernel 2.2.9
    linux linux kernel 2.2.10
    linux linux kernel 2.2.11
    linux linux kernel 2.2.12
    linux linux kernel 2.2.13
    linux linux kernel 2.2.14
    linux linux kernel 2.2.15
    linux linux kernel 2.2.16
    linux linux kernel 2.2.17
    linux linux kernel 2.2.18
    linux linux kernel 2.2.19
    linux linux kernel 2.2.20
    linux linux kernel 2.2.21
    linux linux kernel 2.2.22
    linux linux kernel 2.2.23
    linux linux kernel 2.2.24
    linux linux kernel 2.4.0
    linux linux kernel 2.4.1
    linux linux kernel 2.4.2
    linux linux kernel 2.4.3
    linux linux kernel 2.4.4
    linux linux kernel 2.4.5
    linux linux kernel 2.4.6
    linux linux kernel 2.4.7
    linux linux kernel 2.4.8
    linux linux kernel 2.4.9
    linux linux kernel 2.4.10
    linux linux kernel 2.4.11
    linux linux kernel 2.4.12
    linux linux kernel 2.4.13
    linux linux kernel 2.4.14
    linux linux kernel 2.4.15
    linux linux kernel 2.4.16
    linux linux kernel 2.4.17
    linux linux kernel 2.4.18
    linux linux kernel 2.4.19
    linux linux kernel 2.4.20
    linux linux kernel 2.4.21 pre1
    linux linux kernel 2.2.0
    linux linux kernel 2.2.1
    linux linux kernel 2.4.3
    linux linux kernel 2.4.4
    linux linux kernel 2.4.5
    linux linux kernel 2.4.6
    linux linux kernel 2.4.18
    linux linux kernel 2.4.20
    linux linux kernel 2.4.7
    linux linux kernel 2.2.5
    linux linux kernel 2.2.19
    linux linux kernel 2.2.14
    linux linux kernel 2.4.0
    linux linux kernel 2.4.1
    linux linux kernel 2.4.10
    linux linux kernel 2.4.11
    linux linux kernel 2.4.12
    linux linux kernel 2.4.13
    linux linux kernel 2.4.14
    linux linux kernel 2.4.15
    linux linux kernel 2.4.16
    linux linux kernel 2.4.17
    linux linux kernel 2.4.19
    linux linux kernel 2.4.2
    linux linux kernel 2.4.21
    linux linux kernel 2.4.8
    linux linux kernel 2.4.9
    linux linux kernel 2.2.2
    linux linux kernel 2.2.3
    linux linux kernel 2.2.7
    linux linux kernel 2.2.8
    linux linux kernel 2.2.9
    linux linux kernel 2.2.10
    linux linux kernel 2.2.11
    linux linux kernel 2.2.12
    linux linux kernel 2.2.13
    linux linux kernel 2.2.15
    linux linux kernel 2.2.16
    linux linux kernel 2.2.17
    linux linux kernel 2.2.18
    linux linux kernel 2.2.20
    linux linux kernel 2.2.21
    linux linux kernel 2.2.22
    linux linux kernel 2.2.23
    linux linux kernel 2.2.24
    linux linux kernel 2.2.4
    linux linux kernel 2.2.6
    redhat linux 6.2
    trustix secure linux 1.1
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    conectiva linux 6.0
    suse suse linux 7.1
    redhat linux 7.1
    trustix secure linux 1.01
    trustix secure linux 1.2
    mandrakesoft mandrake single network firewall 7.2
    turbolinux turbolinux server 6.5
    suse suse linux 7.2
    conectiva linux 7.0
    trustix secure linux 1.5
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    sun cobalt raq 4 *
    engardelinux secure linux -
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    sun cobalt raq xtr *
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    engardelinux secure professional -
    gentoo linux *
    suse suse linux office server *
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    suse suse email server 3.1
    suse suse linux 8.1
    suse linux enterprise server 8
    mandrakesoft mandrake multi network firewall 8.2
    turbolinux turbolinux server 6.1
    turbolinux turbolinux workstation 6.0
    mandrakesoft mandrake linux corporate server 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    suse suse linux 8.2
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 8.2