Vulnerability Name: | CVE-2010-0003 (CCN-55973) |
Assigned: | 2009-12-14 |
Published: | 2010-01-08 |
Updated: | 2023-02-13 |
Summary: | The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address. |
CVSS v3 Severity: | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 5.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C) 4.0 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): Complete | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete | 6.6 Medium (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C) 4.9 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): Complete |
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2010-0003
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: CCN Type: RHSA-2010-0146 Important: kernel security and bug fix update
Source: CCN Type: RHSA-2010-0147 Important: kernel security and bug fix update
Source: CCN Type: RHSA-2010-0161 Important: kernel-rt security and bug fix update
Source: CCN Type: SA43315 VMware ESX Server Multiple Kernel Vulnerabilities
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: DEBIAN Type: DSA-1996 linux-2.6 -- privilege escalation/denial of service/sensitive memory leak
Source: DEBIAN Type: DSA-2005 linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: CCN Type: Linux Kernel Archives Web site Linux Kernel
Source: CCN Type: oss-security Mailing List, Tue, 12 Jan 2010 10:54:58 +0800 kernel: infoleak if print-fatal-signals=1
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: OSVDB ID: 61984 Linux Kernel kernel/signal.c print_fatal_signal Function Log File Local Disclosure
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com
Source: CCN Type: BID-37724 Linux Kernel 'print_fatal_signal()' Local Information Disclosure Vulnerability
Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com
Source: CCN Type: USN-894-1 Linux kernel vulnerabilities
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com
Source: XF Type: UNKNOWN kernel-print-fatal-dos(55973)
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: SUSE Type: SUSE-SA:2010:010 Linux kernel security update
Source: SUSE Type: SUSE-SA:2010:012 Linux kernel security update
Source: SUSE Type: SUSE-SA:2010:014 Linux kernel security problems
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1: cpe:/o:linux:linux_kernel:2.6.23:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.26:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.12::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.11::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.8::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.7::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.6::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.5::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.4::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.3::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.2::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.10::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.1::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25.9::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.25::x86_64:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32:git-6:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.4.27:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.4.35:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.3.20:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.3.15:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.2.9:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.2.7:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.1.9:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.0.41:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:7.0.33:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:6.3.9:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:6.2.15:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:6.1.16:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:6.0.60:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:6.0.54:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.7.6:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.6.10:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.6.10.1:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.5.4:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.4.11:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.3.19:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.2.52:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.2.30.1:*:*:*:*:*:*:*OR cpe:/a:intel:e1000:5.2.22:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
linux linux kernel 2.6.23
linux linux kernel 2.6.18
linux linux kernel 2.6.22
linux linux kernel 2.6.18 rc5
linux linux kernel 2.6.18 rc2
linux linux kernel 2.6.18 rc1
linux linux kernel 2.6.22.1
linux linux kernel 2.6.18 rc3
linux linux kernel 2.6.18 rc4
linux linux kernel 2.6.18 rc6
linux linux kernel 2.6.18 rc7
linux linux kernel 2.6.19.4
linux linux kernel 2.6.23.9
linux linux kernel 2.6.22.2
linux linux kernel 2.6.22.8
linux linux kernel 2.6.22.9
linux linux kernel 2.6.22.10
linux linux kernel 2.6.22.11
linux linux kernel 2.6.22.12
linux linux kernel 2.6.22.13
linux linux kernel 2.6.22.14
linux linux kernel 2.6.22.15
linux linux kernel 2.6.22.17
linux linux kernel 2.6.22.18
linux linux kernel 2.6.22.19
linux linux kernel 2.6.22.20
linux linux kernel 2.6.22.21
linux linux kernel 2.6.25.2
linux linux kernel 2.4.36
linux linux kernel 2.4.36.1
linux linux kernel 2.4.36.2
linux linux kernel 2.4.36.3
linux linux kernel 2.4.36.4
linux linux kernel 2.4.36.5
linux linux kernel 2.6.21.6
linux linux kernel 2.6.21.7
linux linux kernel 2.6.24.1
linux linux kernel 2.6.24.2
linux linux kernel 2.6.25
linux linux kernel 2.6.25.1
linux linux kernel 2.6.23.10
linux linux kernel 2.6.24.6
linux linux kernel 2.6.25.3
linux linux kernel 2.6.25.4
linux linux kernel 2.6.24
linux linux kernel 2.6.24.3
linux linux kernel 2.6.24.4
linux linux kernel 2.6.24.5
linux linux kernel 2.6.23.11
linux linux kernel 2.6.23.12
linux linux kernel 2.6.23.13
linux linux kernel 2.6.23.8
linux linux kernel 2.6.21.5
linux linux kernel 2.6.26
linux linux kernel 2.6.25.5
linux linux kernel 2.6.25.6
linux linux kernel 2.6.25.7
linux linux kernel 2.6.25.8
linux linux kernel 2.6.25.9
linux linux kernel 2.6.25.10
linux linux kernel 2.6.26.2
linux linux kernel 2.6.19.5
linux linux kernel 2.6.19.6
linux linux kernel 2.6.19.7
linux linux kernel 2.6.20.16
linux linux kernel 2.6.20.17
linux linux kernel 2.6.20.18
linux linux kernel 2.6.20.19
linux linux kernel 2.6.20.20
linux linux kernel 2.6.20.21
linux linux kernel 2.6.23.15
linux linux kernel 2.6.23.16
linux linux kernel 2.6.23.17
linux linux kernel 2.6.24.7
linux linux kernel 2.6.25.11
linux linux kernel 2.6.25.12
linux linux kernel 2.6.25.13
linux linux kernel 2.6.25.14
linux linux kernel 2.6.25.15
linux linux kernel 2.6.26.1
linux linux kernel 2.6.26.3
linux linux kernel 2.6.22.22
linux linux kernel 2.6.26.5
linux linux kernel 2.6.27
linux linux kernel 2.6.25.16
linux linux kernel 2.6.25.17
linux linux kernel 2.4.36.6
linux linux kernel 2.2.27
linux linux kernel 2.6.25.12
linux linux kernel 2.6.25.11
linux linux kernel 2.6.25.8
linux linux kernel 2.6.25.7
linux linux kernel 2.6.25.6
linux linux kernel 2.6.25.5
linux linux kernel 2.6.25.4
linux linux kernel 2.6.25.3
linux linux kernel 2.6.25.2
linux linux kernel 2.6.25.10
linux linux kernel 2.6.25.1
linux linux kernel 2.6.25.9
linux linux kernel 2.6.25
linux linux kernel 2.6.26.4
linux linux kernel 2.6.28
linux linux kernel 2.6.29 rc2
linux linux kernel 2.6.29 rc1
linux linux kernel 2.6.29 git1
linux linux kernel 2.6.29
linux linux kernel 2.6.23 rc1
linux linux kernel 2.6.24 rc4
linux linux kernel 2.6.24 rc5
linux linux kernel 2.6.22 rc7
linux linux kernel 2.6.22 rc1
linux linux kernel 2.6.24 rc1
linux linux kernel 2.6.30 rc1
linux linux kernel 2.6.30 rc2
linux linux kernel 2.6.30 rc3
linux linux kernel 2.6.29.3
linux linux kernel 2.6.29 rc8-kk
linux linux kernel 2.6.29 rc2_git7
linux linux kernel 2.6.32 rc4
linux linux kernel 2.6.32 rc1
linux linux kernel 2.6.32 rc3
linux linux kernel 2.6.29.rc1
linux linux kernel 2.6.30 rc7-git6
linux linux kernel 2.6.32 rc6
linux linux kernel 2.6.32 rc5
linux linux kernel 2.6.32
linux linux kernel 2.6.32 rc7
linux linux kernel 2.6.32 rc8
linux linux kernel 2.6.32 git-6
intel e1000 7.4.27
intel e1000 7.4.35
intel e1000 7.3.20
intel e1000 7.3.15
intel e1000 7.2.9
intel e1000 7.2.7
intel e1000 7.1.9
intel e1000 7.0.41
intel e1000 7.0.33
intel e1000 6.3.9
intel e1000 6.2.15
intel e1000 6.1.16
intel e1000 6.0.60
intel e1000 6.0.54
intel e1000 5.7.6
intel e1000 5.6.10
intel e1000 5.6.10.1
intel e1000 5.5.4
intel e1000 5.4.11
intel e1000 5.3.19
intel e1000 5.2.52
intel e1000 5.2.30.1
intel e1000 5.2.22
linux linux kernel 2.6.32.1
linux linux kernel 2.6.32.2
linux linux kernel 2.6.32.3
linux linux kernel 2.6.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
canonical ubuntu 6.06
redhat enterprise linux 5
debian debian linux 4.0
redhat enterprise linux 5
canonical ubuntu 8.04
novell opensuse 11.0
debian debian linux 5.0