Vulnerability Name: CVE-2010-0003 (CCN-55973) Assigned: 2009-12-14 Published: 2010-01-08 Updated: 2023-02-13 Summary: The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address. CVSS v3 Severity: 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 5.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C )4.0 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C )3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
6.6 Medium (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C )4.9 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2010-0003 Source: secalert@redhat.com Type: UNKNOWNsecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisorysecalert@redhat.com Source: CCN Type: RHSA-2010-0146Important: kernel security and bug fix update Source: CCN Type: RHSA-2010-0147Important: kernel security and bug fix update Source: CCN Type: RHSA-2010-0161Important: kernel-rt security and bug fix update Source: CCN Type: SA43315VMware ESX Server Multiple Kernel Vulnerabilities Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: DEBIAN Type: DSA-1996linux-2.6 -- privilege escalation/denial of service/sensitive memory leak Source: DEBIAN Type: DSA-2005linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak Source: secalert@redhat.com Type: Vendor Advisorysecalert@redhat.com Source: CCN Type: Linux Kernel Archives Web siteLinux Kernel Source: CCN Type: oss-security Mailing List, Tue, 12 Jan 2010 10:54:58 +0800kernel: infoleak if print-fatal-signals=1 Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: CCN Type: OSVDB ID: 61984Linux Kernel kernel/signal.c print_fatal_signal Function Log File Local Disclosure Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entrysecalert@redhat.com Source: CCN Type: BID-37724Linux Kernel 'print_fatal_signal()' Local Information Disclosure Vulnerability Source: secalert@redhat.com Type: Third Party Advisory, VDB Entrysecalert@redhat.com Source: CCN Type: USN-894-1Linux kernel vulnerabilities Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisorysecalert@redhat.com Source: XF Type: UNKNOWNkernel-print-fatal-dos(55973) Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: SUSE Type: SUSE-SA:2010:010Linux kernel security update Source: SUSE Type: SUSE-SA:2010:012Linux kernel security update Source: SUSE Type: SUSE-SA:2010:014Linux kernel security problems Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/o:linux:linux_kernel:2.6.23:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.26:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.12::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.11::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.8::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.7::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.6::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.5::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.4::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.3::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.2::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.10::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.1::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25.9::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.25::x86_64:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:git-6:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.4.27:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.4.35:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.3.20:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.3.15:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.2.9:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.2.7:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.1.9:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.0.41:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:7.0.33:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:6.3.9:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:6.2.15:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:6.1.16:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:6.0.60:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:6.0.54:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.7.6:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.6.10:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.6.10.1:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.5.4:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.4.11:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.3.19:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.2.52:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.2.30.1:*:*:*:*:*:*:* OR cpe:/a:intel:e1000:5.2.22:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
linux linux kernel 2.6.23
linux linux kernel 2.6.18
linux linux kernel 2.6.22
linux linux kernel 2.6.18 rc5
linux linux kernel 2.6.18 rc2
linux linux kernel 2.6.18 rc1
linux linux kernel 2.6.22.1
linux linux kernel 2.6.18 rc3
linux linux kernel 2.6.18 rc4
linux linux kernel 2.6.18 rc6
linux linux kernel 2.6.18 rc7
linux linux kernel 2.6.19.4
linux linux kernel 2.6.23.9
linux linux kernel 2.6.22.2
linux linux kernel 2.6.22.8
linux linux kernel 2.6.22.9
linux linux kernel 2.6.22.10
linux linux kernel 2.6.22.11
linux linux kernel 2.6.22.12
linux linux kernel 2.6.22.13
linux linux kernel 2.6.22.14
linux linux kernel 2.6.22.15
linux linux kernel 2.6.22.17
linux linux kernel 2.6.22.18
linux linux kernel 2.6.22.19
linux linux kernel 2.6.22.20
linux linux kernel 2.6.22.21
linux linux kernel 2.6.25.2
linux linux kernel 2.4.36
linux linux kernel 2.4.36.1
linux linux kernel 2.4.36.2
linux linux kernel 2.4.36.3
linux linux kernel 2.4.36.4
linux linux kernel 2.4.36.5
linux linux kernel 2.6.21.6
linux linux kernel 2.6.21.7
linux linux kernel 2.6.24.1
linux linux kernel 2.6.24.2
linux linux kernel 2.6.25
linux linux kernel 2.6.25.1
linux linux kernel 2.6.23.10
linux linux kernel 2.6.24.6
linux linux kernel 2.6.25.3
linux linux kernel 2.6.25.4
linux linux kernel 2.6.24
linux linux kernel 2.6.24.3
linux linux kernel 2.6.24.4
linux linux kernel 2.6.24.5
linux linux kernel 2.6.23.11
linux linux kernel 2.6.23.12
linux linux kernel 2.6.23.13
linux linux kernel 2.6.23.8
linux linux kernel 2.6.21.5
linux linux kernel 2.6.26
linux linux kernel 2.6.25.5
linux linux kernel 2.6.25.6
linux linux kernel 2.6.25.7
linux linux kernel 2.6.25.8
linux linux kernel 2.6.25.9
linux linux kernel 2.6.25.10
linux linux kernel 2.6.26.2
linux linux kernel 2.6.19.5
linux linux kernel 2.6.19.6
linux linux kernel 2.6.19.7
linux linux kernel 2.6.20.16
linux linux kernel 2.6.20.17
linux linux kernel 2.6.20.18
linux linux kernel 2.6.20.19
linux linux kernel 2.6.20.20
linux linux kernel 2.6.20.21
linux linux kernel 2.6.23.15
linux linux kernel 2.6.23.16
linux linux kernel 2.6.23.17
linux linux kernel 2.6.24.7
linux linux kernel 2.6.25.11
linux linux kernel 2.6.25.12
linux linux kernel 2.6.25.13
linux linux kernel 2.6.25.14
linux linux kernel 2.6.25.15
linux linux kernel 2.6.26.1
linux linux kernel 2.6.26.3
linux linux kernel 2.6.22.22
linux linux kernel 2.6.26.5
linux linux kernel 2.6.27
linux linux kernel 2.6.25.16
linux linux kernel 2.6.25.17
linux linux kernel 2.4.36.6
linux linux kernel 2.2.27
linux linux kernel 2.6.25.12
linux linux kernel 2.6.25.11
linux linux kernel 2.6.25.8
linux linux kernel 2.6.25.7
linux linux kernel 2.6.25.6
linux linux kernel 2.6.25.5
linux linux kernel 2.6.25.4
linux linux kernel 2.6.25.3
linux linux kernel 2.6.25.2
linux linux kernel 2.6.25.10
linux linux kernel 2.6.25.1
linux linux kernel 2.6.25.9
linux linux kernel 2.6.25
linux linux kernel 2.6.26.4
linux linux kernel 2.6.28
linux linux kernel 2.6.29 rc2
linux linux kernel 2.6.29 rc1
linux linux kernel 2.6.29 git1
linux linux kernel 2.6.29
linux linux kernel 2.6.23 rc1
linux linux kernel 2.6.24 rc4
linux linux kernel 2.6.24 rc5
linux linux kernel 2.6.22 rc7
linux linux kernel 2.6.22 rc1
linux linux kernel 2.6.24 rc1
linux linux kernel 2.6.30 rc1
linux linux kernel 2.6.30 rc2
linux linux kernel 2.6.30 rc3
linux linux kernel 2.6.29.3
linux linux kernel 2.6.29 rc8-kk
linux linux kernel 2.6.29 rc2_git7
linux linux kernel 2.6.32 rc4
linux linux kernel 2.6.32 rc1
linux linux kernel 2.6.32 rc3
linux linux kernel 2.6.29.rc1
linux linux kernel 2.6.30 rc7-git6
linux linux kernel 2.6.32 rc6
linux linux kernel 2.6.32 rc5
linux linux kernel 2.6.32
linux linux kernel 2.6.32 rc7
linux linux kernel 2.6.32 rc8
linux linux kernel 2.6.32 git-6
intel e1000 7.4.27
intel e1000 7.4.35
intel e1000 7.3.20
intel e1000 7.3.15
intel e1000 7.2.9
intel e1000 7.2.7
intel e1000 7.1.9
intel e1000 7.0.41
intel e1000 7.0.33
intel e1000 6.3.9
intel e1000 6.2.15
intel e1000 6.1.16
intel e1000 6.0.60
intel e1000 6.0.54
intel e1000 5.7.6
intel e1000 5.6.10
intel e1000 5.6.10.1
intel e1000 5.5.4
intel e1000 5.4.11
intel e1000 5.3.19
intel e1000 5.2.52
intel e1000 5.2.30.1
intel e1000 5.2.22
linux linux kernel 2.6.32.1
linux linux kernel 2.6.32.2
linux linux kernel 2.6.32.3
linux linux kernel 2.6.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
canonical ubuntu 6.06
redhat enterprise linux 5
debian debian linux 4.0
redhat enterprise linux 5
canonical ubuntu 8.04
novell opensuse 11.0
debian debian linux 5.0