exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice 947-2

Ubuntu Security Notice 947-2
Posted Jun 4, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 947-2 - USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for CVE-2010-0419 caused failures when using KVM in certain situations. This update reverts that fix until a better solution can be found.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-4271, CVE-2009-4537, CVE-2010-0008, CVE-2010-0298, CVE-2010-0306, CVE-2010-0419, CVE-2010-0437, CVE-2010-0727, CVE-2010-0741, CVE-2010-1083, CVE-2010-1084, CVE-2010-1085, CVE-2010-1086, CVE-2010-1087, CVE-2010-1088, CVE-2010-1146, CVE-2010-1148, CVE-2010-1162
SHA-256 | 21c2ee0fe26dc2ec28a543eaeffce5b4a7c806c118defb8010bd9a9619c49b8c

Ubuntu Security Notice 947-2

Change Mirror Download
===========================================================
Ubuntu Security Notice USN-947-2 June 04, 2010
linux regression
https://launchpad.net/bugs/589163
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-22-386 2.6.32-22.36
linux-image-2.6.32-22-generic 2.6.32-22.36
linux-image-2.6.32-22-generic-pae 2.6.32-22.36
linux-image-2.6.32-22-lpia 2.6.32-22.36
linux-image-2.6.32-22-preempt 2.6.32-22.36
linux-image-2.6.32-22-server 2.6.32-22.36
linux-image-2.6.32-22-virtual 2.6.32-22.36

After a standard system update you need to reboot your computer to make
all the necessary changes.

Details follow:

USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for
CVE-2010-0419 caused failures when using KVM in certain situations.
This update reverts that fix until a better solution can be found.

We apologize for the inconvenience.

Original advisory details:

It was discovered that the Linux kernel did not correctly handle memory
protection of the Virtual Dynamic Shared Object page when running
a 32-bit application on a 64-bit kernel. A local attacker could
exploit this to cause a denial of service. (Only affected Ubuntu 6.06
LTS.) (CVE-2009-4271)

It was discovered that the r8169 network driver did not correctly check
the size of Ethernet frames. A remote attacker could send specially
crafted traffic to crash the system, leading to a denial of service.
(CVE-2009-4537)

Wei Yongjun discovered that SCTP did not correctly validate certain
chunks. A remote attacker could send specially crafted traffic to
monopolize CPU resources, leading to a denial of service. (Only affected
Ubuntu 6.06 LTS.) (CVE-2010-0008)

It was discovered that KVM did not correctly limit certain privileged
IO accesses on x86. Processes in the guest OS with access to IO regions
could gain further privileges within the guest OS. (Did not affect Ubuntu
6.06 LTS.) (CVE-2010-0298, CVE-2010-0306, CVE-2010-0419)

Evgeniy Polyakov discovered that IPv6 did not correctly handle
certain TUN packets. A remote attacker could exploit this to crash
the system, leading to a denial of service. (Only affected Ubuntu 8.04
LTS.) (CVE-2010-0437)

Sachin Prabhu discovered that GFS2 did not correctly handle certain locks.
A local attacker with write access to a GFS2 filesystem could exploit
this to crash the system, leading to a denial of service. (CVE-2010-0727)

Jamie Strandboge discovered that network virtio in KVM did not correctly
handle certain high-traffic conditions. A remote attacker could exploit
this by sending specially crafted traffic to a guest OS, causing the
guest to crash, leading to a denial of service. (Only affected Ubuntu
8.04 LTS.) (CVE-2010-0741)

Marcus Meissner discovered that the USB subsystem did not correctly handle
certain error conditions. A local attacker with access to a USB device
could exploit this to read recently used kernel memory, leading to a
loss of privacy and potentially root privilege escalation. (CVE-2010-1083)

Neil Brown discovered that the Bluetooth subsystem did not correctly
handle large amounts of traffic. A physically proximate remote attacker
could exploit this by sending specially crafted traffic that would consume
all available system memory, leading to a denial of service. (Ubuntu
6.06 LTS and 10.04 LTS were not affected.) (CVE-2010-1084)

Jody Bruchon discovered that the sound driver for the AMD780V did not
correctly handle certain conditions. A local attacker with access to
this hardward could exploit the flaw to cause a system crash, leading
to a denial of service. (CVE-2010-1085)

Ang Way Chuang discovered that the DVB driver did not correctly handle
certain MPEG2-TS frames. An attacker could exploit this by delivering
specially crafted frames to monopolize CPU resources, leading to a denial
of service. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1086)

Trond Myklebust discovered that NFS did not correctly handle truncation
under certain conditions. A local attacker with write access to an NFS
share could exploit this to crash the system, leading to a denial of
service. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1087)

Al Viro discovered that automount of NFS did not correctly handle symlinks
under certain conditions. A local attacker could exploit this to crash
the system, leading to a denial of service. (Ubuntu 6.06 LTS and Ubuntu
10.04 LTS were not affected.) (CVE-2010-1088)

Matt McCutchen discovered that ReiserFS did not correctly protect xattr
files in the .reiserfs_priv directory. A local attacker could exploit
this to gain root privileges or crash the system, leading to a denial
of service. (CVE-2010-1146)

Eugene Teo discovered that CIFS did not correctly validate arguments when
creating new files. A local attacker could exploit this to crash the
system, leading to a denial of service, or possibly gain root privileges
if mmap_min_addr was not set. (CVE-2010-1148)

Catalin Marinas and Tetsuo Handa discovered that the TTY layer did not
correctly release process IDs. A local attacker could exploit this to
consume kernel resources, leading to a denial of service. (CVE-2010-1162)

Neil Horman discovered that TIPC did not correctly check its internal
state. A local attacker could send specially crafted packets via AF_TIPC
that would cause the system to crash, leading to a denial of service.
(Ubuntu 6.06 LTS was not affected.) (CVE-2010-1187)

Masayuki Nakagawa discovered that IPv6 did not correctly handle
certain settings when listening. If a socket were listening with the
IPV6_RECVPKTINFO flag, a remote attacker could send specially crafted
traffic that would cause the system to crash, leading to a denial of
service. (Only Ubuntu 6.06 LTS was affected.) (CVE-2010-1188)

Oleg Nesterov discovered that the Out-Of-Memory handler did not correctly
handle certain arrangements of processes. A local attacker could exploit
this to crash the system, leading to a denial of service. (CVE-2010-1488)


Updated packages for Ubuntu 10.04:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.32-22.36.diff.gz
Size/MD5: 4620314 23544244a9ba9d2813fcad47ff193832
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.32-22.36.dsc
Size/MD5: 4173 5bfeabadfe63e20bdc7547adc228e57d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.32.orig.tar.gz
Size/MD5: 81900940 4b1f6f6fac43a23e783079db589fc7e2

Architecture independent packages:

https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.32-22.36_all.deb
Size/MD5: 6391930 eef7837b7d89be0754fa54e257bb4f62
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22_2.6.32-22.36_all.deb
Size/MD5: 9867774 4708fca5feb100fd9388cd722498e465
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.32_2.6.32-22.36_all.deb
Size/MD5: 65815134 f84878cec91f27762f7198881d14e981
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-common_2.6.32-22.36_all.deb
Size/MD5: 60692 f4cbd8527531bbd7c9398ebc702862c3

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 237842 fdaf5065d555661e003032f6224376c0
https://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 16524 56d59e0b76a1bf05612337ccf32678cc
https://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 50054 46e1d8a0b80150258fcb5a339d018d12
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 46260 ff9e4bf3a594d498f9cffedf15d54b22
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 51762 67b3889e28fbd914689bfd4e15d402a5
https://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 95192 5623fd57a1129b3870fa68a4bb04bcdc
https://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 38660 02bdd597a8304b536964a8a5291e52f8
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 538876 089e75ecb254b731c72319e016b68489
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 133536 02634ccb41a9ce17d9fcdee480004942
https://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 98896 898586510e99a43a183babba33dd57e8
https://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 320112 88283e75dd075ccab1e97f17772d50b9
https://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 4450002 c69051de37c1ec1761f81ad2cc05b387
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22-generic_2.6.32-22.36_amd64.deb
Size/MD5: 744900 8b879aae48191a0cf6569a1c2c8c23c3
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22-preempt_2.6.32-22.36_amd64.deb
Size/MD5: 745120 9c09a7b7e5ce5f937eba08a57933fce0
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22-server_2.6.32-22.36_amd64.deb
Size/MD5: 747642 19150486cadb8c12f08da8204be201ee
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-generic_2.6.32-22.36_amd64.deb
Size/MD5: 30860900 6dd13e16fcd57211c821dd4973b6aebf
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-preempt_2.6.32-22.36_amd64.deb
Size/MD5: 31127436 940fc47462952a19dfe5483d2aeaf45d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-server_2.6.32-22.36_amd64.deb
Size/MD5: 30937408 31c3966476e5b5070525c7ce7ad56c5f
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-virtual_2.6.32-22.36_amd64.deb
Size/MD5: 12400846 0381b0c8653768a04c2d57441591eb4e
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.32-22.36_amd64.deb
Size/MD5: 771336 4c50a089f762a6075363089c5c2a1e3e
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-2.6.32-22_2.6.32-22.36_amd64.deb
Size/MD5: 188452 3240dc0634c07f9d8a0a69354392ba02
https://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 179004 8f4275cc34f9151ee962767df18a274f
https://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 266248 878212442e8f6b91a80ed02a2982aded
https://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 32458 b3f137e4f610898de47abd36248f85ca
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 330616 47bed456e447f2cf7d84db274481d3fe
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 2379188 3a9106c6f8befa26ec62e7828f09d0d5
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 163568 bb78d8d62f7c0b5d8ec0061b0f873457
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 245612 faa9b3c0a8925e4e8011ead7c7eb7b9f
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 179788 072d1095a052c21eb2716c7369f35286
https://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 39238 2f389c3ed477824e6c04a100202759a2
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 150324 58d5169104db3679d6220f6329973e47
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 76634 ea0123873af095db46d0333917aa45c5
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 22996 6b79b3109c449f22bf0119b424ad0eb1
https://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 9742 7dc73134100313ecccbae0627562a6c1
https://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 41028 1dadca198910710787b44c5e8eb62123
https://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 103702 c2cc40521d88b9d1e64c108975e93731
https://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 1445184 bfc6121b7da80615604753d98472996b
https://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 40680 26f924907b62fd7727f56a5bd53ff46d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 15418 e3cb97f4c6f7215649ee47bf16566e3d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 53056 d433b3babb9528207aa4d0da78419588
https://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 134942 5ee8f1bd29f27b0fe0eca98ca27e5850
https://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 16742 7a9c943c70a9a95b19eae658cd22387c
https://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.32-22-generic-di_2.6.32-22.36_amd64.udeb
Size/MD5: 22358 ea3424a1956e57081c9aa75434d14d18

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 207178 d9195e18cc14c055ca26d7125018592c
https://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 212542 f4fabc8abadb9921c943c81bd7cd1cc6
https://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 34252 e2cb47381041a233b1cc3b09fc1c8d66
https://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 34556 b0a1d141b2bf0e708bf813c5febda581
https://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 48026 001e73f47a047f57898f057058f8f380
https://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 48034 2bfcf599e155a94c3ba815d7529bdbaa
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 43640 2b47184ab3c1812dda64408555f0684d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 43656 b41fcc83392e14d432f84b65305ac686
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 47824 aad57adea6e182770e6890d9af79fa46
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 47890 b2407269da70e4a3b7168ee61953fbe8
https://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 90440 e7ae4532b268707c2992206947a0bf0f
https://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 90780 c9d91754bf00c8dd7a732638c166a8f8
https://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 34638 557b3a329e273c36324b56c2d56e3c99
https://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 34692 89499429e3e17e99e2b1f3c06e115ee6
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 535030 0402d23a1c349707496ee2eb97cf3d9c
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 534768 eadf14a04e32473f8656a5a6427bafa0
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 130862 a1d83f86ac760cdec302688eef32ec2e
https://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 130878 c91b44e196c517bb3b10b611669352e7
https://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 91584 e44721a48409edbc083d41a496c92f9c
https://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 91658 553eec809810fbd5f5bd0b2dd9a8998d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 305254 945bf41968c49cf1c1ada3380b74311e
https://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 306182 9d7a4028c4ce79c243723b6eb45df5ce
https://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 4301528 ca690b698099e6f7188f8bdd19c735f7
https://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 4430586 75f2c0bd2f30ef636945b0ab0a01da2a
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22-386_2.6.32-22.36_i386.deb
Size/MD5: 726970 94508b7dd3598b14e3ad090e408d0429
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22-generic-pae_2.6.32-22.36_i386.deb
Size/MD5: 729346 b6966db877c6a06075b6ee470bcf366e
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-22-generic_2.6.32-22.36_i386.deb
Size/MD5: 727582 e771dc4ddd8b661fc591fe6b711548e2
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-386_2.6.32-22.36_i386.deb
Size/MD5: 30922398 cbfbc2c7148ecf7df8444ff28981a427
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-generic-pae_2.6.32-22.36_i386.deb
Size/MD5: 31020108 ae81d0eef858793991b10e5e5dcf3ced
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-generic_2.6.32-22.36_i386.deb
Size/MD5: 30928952 7058823781d8d588dd295ec8fc566919
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-22-virtual_2.6.32-22.36_i386.deb
Size/MD5: 11936882 55ccd0620e71249c97a69376e119e849
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.32-22.36_i386.deb
Size/MD5: 771326 5bef92c67cdac95715577e7e96db6c13
https://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-2.6.32-22_2.6.32-22.36_i386.deb
Size/MD5: 180534 41a347851672876dc91592599f995892
https://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 182656 26149d4bd950660a5a01ef0d21440b2b
https://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 182804 226b4af7d132e4acb14e81493145f2a9
https://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 249286 33d0bf2421af14aa7036c3a1d4382ed8
https://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 251966 881c8b9700580d7f05c84891cbb984a6
https://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 33840 a576fb6ef38961c7aea3b2a333b6ff3e
https://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 33862 aeba2af0e6f210a2a27e50dbf1a620a6
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 310380 50bb54c3a9d21f7dea9dd34971a6f0ff
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 310408 5d890ed0e0fafd260269fa5b939a641f
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 2493642 6ad78bd80f9534aaac902995994bae86
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 2511228 c551f959d3e603e5045cb4c4a66f6074
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 147220 7db6ce0130f0fc0db5806b38f97bb5f7
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 147294 59cbca130e3948e834e30cabe5978bd4
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 228666 de07c69f6b4d5c9b78aebe127861c3c3
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 228730 ac03a8b56d92ba71ff0677db7e67faec
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 165946 946ef91984a334fa726d0aa7ac0f5501
https://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 166004 7f511a6a6507916ff5a241aa4e987148
https://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 36360 895fe877da4058a82f0211a1f8ab398d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 36486 def199e6c50e66b75819f0efed2e23a1
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 156924 c6f0b7b6800bcc45316acd01f40698ab
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 157184 beba4efb9f8524c804668ddd84a5045b
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 90200 14c3f20d531e972a90051f96a25038de
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 91100 67a1c91583c275b60e03160fc94a2b6d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 48114 c794dd0fca0323605ced624c4913906c
https://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 48152 54b12453cadc0d933042d0890c9bb23c
https://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 9106 b1f4ce964238da88324911e2469725b9
https://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 9108 a87c87e648f990a3f01e2d0a4b288510
https://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 37456 47efb5b0ff404a4abd59104db9b0bd62
https://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 37468 c7dfc65e8f0cf699d9ec8d260565bc6d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 93842 252dbbc6141992eaf4e5162b9033058a
https://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 94396 4b5299c37ad6867584902157185304c9
https://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 1555964 7020631e96af1a34c6ab7bd903b8e362
https://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 1506780 2188ac6cd7a7ce71aec08659996a2461
https://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 37970 e85160bb43768c67378426eee3d6b9d5
https://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 37970 e8b64bfb6a0935930881eb58a967ef7b
https://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 15566 fd8d5f0707836f6ab0872b5ac3c8b7c4
https://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 15574 ce5c114a76dd46e61114603a921baed3
https://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 50006 7aaafb54c503e9e08c6db46ad050b39d
https://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 50046 804d6b78e5a955424a126da2b4757c52
https://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 123832 3f009aa19ebf8bdda06c667d9ae73356
https://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 124258 9be8165f7bf6ca8ec1c31fab49bb54ba
https://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 15490 a970d0b87c607fd1456f76b34a56b6db
https://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 5706 86fdc888fd82fe6f5471c5bd076e8bab
https://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.32-22-generic-di_2.6.32-22.36_i386.udeb
Size/MD5: 20782 2a974920ea55f461edd55aaaf0175572
https://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.32-22-generic-pae-di_2.6.32-22.36_i386.udeb
Size/MD5: 20796 ca6358bc7cbfdb3cfb2fc4a28ff5528c

powerpc architecture (Apple Macintosh G3/G4/G5):

https://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 340856 4a94b409c989f9caeb1a706be0c44abd
https://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 281616 79c705d6e9fbccbec2bb01c5aba27fd9
https://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 60558 158cacce39d88f75fa09b48126fa30f5
https://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 68710 385903a22502606efc7a93996033bdea
https://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 48386 814c9e44e12cec02c7ae8305ae6fb6a4
https://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 53126 7318b33e1b9e5102af36435eb4a7a2cf
https://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 96782 640ae4dd1b510f363d72475ab5235dc9
https://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 109858 6c88d4cf2d1754383ae397070a575f55
https://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 41000 09243923ccf076094c1ef911920241ef
https://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 40386 cfaf6ad4f0c70c2a2e60953a298cd506
https://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 598550 f1fe24319ccd5f49a1b26ac174886f19
https://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 631372 11c3335dec0adba16a9544885e18d358
https://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 155234 0bdb186aee62747520b380e5790c275a
https://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 150518 66694cf34afae193445dc699961adfca
https://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 106282 33dbaae4138300267b2cfda5a1aecc9b
https://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 110214 a94069ccbf21259c6b26c6361f0dd4d7
https://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 418766 e1abc317d4a54a547e552f21703d9f6e
https://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 355162 18938c5b25ab0db483199ecf537a0b79
https://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 4184438 ad81258d50ff2e3a48cc5dd592e6252a
https://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 5568942 127c0868718dba252528ae81674e8f07
https://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-22-powerpc-smp_2.6.32-22.36_powerpc.deb
Size/MD5: 833208 0ea7d204d8ad4e1bbbb7822b230535a7
https://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-22-powerpc64-smp_2.6.32-22.36_powerpc.deb
Size/MD5: 852662 b953f28e11f30d10e511e9decc5477b6
https://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-22-powerpc_2.6.32-22.36_powerpc.deb
Size/MD5: 834352 2cc90a851db551bbe5a043d74376e4c7
https://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-22-powerpc-smp_2.6.32-22.36_powerpc.deb
Size/MD5: 27690900 0515cf4fccb3fb54e4924380a57cf414
https://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-22-powerpc64-smp_2.6.32-22.36_powerpc.deb
Size/MD5: 28530610 b5eae86ee391dda638916ac8b8c89436
https://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-22-powerpc_2.6.32-22.36_powerpc.deb
Size/MD5: 27422554 253b2c11f4b16a47ae09c37ed69799e6
https://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.32-22.36_powerpc.deb
Size/MD5: 760684 2fd1dece73c119c0ce1bcb88b0d944c9
https://ports.ubuntu.com/pool/main/l/linux/linux-tools-2.6.32-22_2.6.32-22.36_powerpc.deb
Size/MD5: 196530 4fa99c183c76ae90323aa4aa3ab367a0
https://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 289416 f1019ca964d716988acebb3158d5767e
https://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 310390 02a1681ff422de93403a1533dc43f004
https://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 221144 cf661d5566c817bb9fe1fba3d44cb4c0
https://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 223818 b8c26b3595dfe947a05a2bb1f419e8e9
https://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 31934 84aa64311c7172e9e51be160e4445e02
https://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 36496 84be3503bdc2086f25154e8059e4e890
https://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 343920 551d3ac17aaeff42ca92f162ec43cdbf
https://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 385804 a66b507bb00b414faaef6c7bacc73d14
https://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 2173148 2c9a22bb2b3b26b71192051ad2f6c79d
https://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 2372786 579a1d81fef0b1e201948478bbc1cbdc
https://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 223058 557d97d18f577fb82cd96560693df952
https://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 217330 9d7ec20fa8767228480a73e517fc61b4
https://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 259830 9b39b614deca56571f8ac2e3bdb0a5c0
https://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 296086 bb47a71bd2d5c469c6f6ff91ef86a68c
https://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 131882 e27093798649f03278feb8e0f3c7c80d
https://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 154664 af222c98fa32e9a8e90ebc9121e86062
https://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 50976 0be39642e110f95d7da4441f71c4efe5
https://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 45512 ccce695cc1e00aa28fbab1b67062ad43
https://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 108044 3273c7e102c74c6782c9eeb00e696d3b
https://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 123886 6437c77acc029c691e7e2db0a7b8a60c
https://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 84352 856d45686500754f55ec50a484621568
https://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 89956 a50d05e28be5eeec4b8a07e5f0d10eda
https://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 77224 b9eaca2259408ee612705d1d9388ae8b
https://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 28408 88095a49778a9f0b5154b15057b75020
https://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 8960 e2eb63ec8bd950da666c27e22c6ed268
https://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 10186 c6db7f45ac28193ba67625e46faaf4ed
https://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 62106 8d9fe61aff15ac5166455a798d74cb2d
https://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 72514 40b454a1f40c83e561bff9325d9a4e5e
https://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 106894 42ab6b8bec5e5c5d6832838355c5d983
https://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 136596 37743665fbd2221ec2c789edc3bb708d
https://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 1648484 50dbc10b0655c5b5fd593b993ce5b4a5
https://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 1575098 a38d95d01d1f7a429851f5f28a549395
https://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 78218 b2011f3d730167a33c06e94264774526
https://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 83478 148e1d16ddd53bb72ae2a66d275ac4d2
https://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 17456 67a60372b93202244c3c9a072f141bb8
https://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 18512 57e4235f0761a77ff7fb8f9bfa31360f
https://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 67938 525ad2ee098cd91c0b36ecceeed901ac
https://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 80282 6d97bb3f2028771801bf0280d883197d
https://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 152206 46e066a178c0e16e37512f4978744046
https://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 159704 fc6580e0462f97b506862274a3e9f075
https://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.32-22-powerpc-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 22520 061354f649301a7f23cbd244e5a2512e
https://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.32-22-powerpc64-smp-di_2.6.32-22.36_powerpc.udeb
Size/MD5: 25776 fe90d20126c1d7bee6589a0c3e7a747a

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close