Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0691 -- [Linux][Debian] New Linux 2.4.27 and 2.6.8 packages fix several vulnerabilities 26 September 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel 2.6.8 kernel 2.4.27 Publisher: Debian Operating System: Debian GNU/Linux 3.1 Linux variants Impact: Root Compromise Execute Arbitrary Code/Commands Denial of Service Access Privileged Data Inappropriate Access Access: Remote/Unauthenticated Existing Account CVE Names: CVE-2006-4535 CVE-2006-4145 CVE-2006-4093 CVE-2006-3745 CVE-2006-3468 CVE-2006-2936 CVE-2006-2935 CVE-2006-2446 CVE-2006-2444 CVE-2006-1856 CVE-2006-1855 CVE-2006-1528 CVE-2006-1343 CVE-2006-1052 CVE-2005-4798 CVE-2004-2660 Original Bulletin: http://www.debian.org/security/2006/dsa-1184 http://www.debian.org/security/2006/dsa-1183 Comment: This bulletin contains two Debian advisories, one concerning kernel 2.4.27 and the other kernel 2.6.8. This advisory references vulnerabilities in the Linux kernel that also affect distributions other than Debian. It is recommended that administrators running Linux check for an updated version of the kernel for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 1183-1 security@debian.org http://www.debian.org/security/ Dann Frazier September 25th, 2006 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : kernel-source-2.4.27 Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2005-4798 CVE-2006-2935 CVE-2006-1528 CVE-2006-2444 CVE-2006-2446 CVE-2006-3745 CVE-2006-4535 CERT advisory : VU#681569 BugTraq IDs : 18081 18101 18847 19666 20087 Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4798 A buffer overflow in NFS readlink handling allows a malicious remote server to cause a denial of service. CVE-2006-2935 Diego Calleja Garcia discovered a buffer overflow in the DVD handling code that could be exploited by a specially crafted DVD or USB storage device to execute arbitrary code. CVE-2006-1528 A bug in the SCSI driver allows a local user to cause a denial of service. CVE-2006-2444 Patrick McHardy discovered a bug in the SNMP NAT helper that allows remote attackers to cause a denial of service. CVE-2006-2446 A race condition in the socket buffer handling allows remote attackers to cause a denial of service. CVE-2006-3745 Wei Wang discovered a bug in the SCTP implementation that allows local users to cause a denial of service and possibly gain root privileges. CVE-2006-4535 David Miller reported a problem with the fix for CVE-2006-3745 that allows local users to crash the system using via an SCTP socket with a certain SO_LINGER value. The following matrix explains which kernel version for which architecture fixes the problem mentioned above: stable (sarge) Source 2.4.27-10sarge4 Alpha architecture 2.4.27-10sarge4 ARM architecture 2.4.27-2sarge4 Intel IA-32 architecture 2.4.27-10sarge4 Intel IA-64 architecture 2.4.27-10sarge4 Motorola 680x0 architecture 2.4.27-3sarge4 MIPS architectures 2.4.27-10.sarge4.040815-1 PowerPC architecture 2.4.27-10sarge4 IBM S/390 2.4.27-2sarge4 Sun Sparc architecture 2.4.27-9sarge4 FAI 1.9.1sarge4 mindi-kernel 2.4.27-2sarge3 kernel-image-speakup-i386 2.4.27-1.1sarge3 systemimager 3.2.3-6sarge3 For the unstable distribution (sid) these problems won't be fixed anymore in the 2.4 kernel series. We recommend that you upgrade your kernel package and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge4.dsc Size/MD5 checksum: 900 0a2336025f8cbcfc621ba50b9660a7bf http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge4.diff.gz Size/MD5 checksum: 748331 b5b22b68654428a9da5b966b913c752a http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc Size/MD5 checksum: 831 88a98b9f6aa9ebd3cdfe4978f4ee56da http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz Size/MD5 checksum: 31842 6ab91f91278a604a4916a2b31905d515 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge4.dsc Size/MD5 checksum: 840 cd0d106949bcd9a40dcdc4d2a4d862d2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge4.tar.gz Size/MD5 checksum: 34000 2dec31a15fe7ea34f1f8c5dc62911568 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge4.dsc Size/MD5 checksum: 1581 01aef428bb7beb4c4b85ead4f7560647 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge4.tar.gz Size/MD5 checksum: 99332 f88a415582bc8ab14077618daadaaac2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge4.dsc Size/MD5 checksum: 1143 43ad8f588032f8e388251589d81a90ae http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge4.tar.gz Size/MD5 checksum: 55153 292ecbc0d7503145a1ddaa8a230643f4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge4.dsc Size/MD5 checksum: 876 43ed0b4fa60018a09b7b5dc9df3f7079 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge4.tar.gz Size/MD5 checksum: 12396 a24fa72798951290096a5946be320b1c http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-1.dsc Size/MD5 checksum: 1051 6c465dd7e08dff3e591a395bbe6476e8 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-1.tar.gz Size/MD5 checksum: 308729 f14792acf8a4725d3050ed4b0cb8f4be http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge4.dsc Size/MD5 checksum: 832 97bd5affa5f2a14c517d3a9a5d0e9e0b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge4.tar.gz Size/MD5 checksum: 10148 0e1a0b39d5e5546bc07c4228ee4f615b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge4.dsc Size/MD5 checksum: 1074 efb105f7cdecd3eab73f29ba72cd5f8b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge4.tar.gz Size/MD5 checksum: 24326 accdb4ce4bb6e551ac717b558ce30a29 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27-2sarge1.dsc Size/MD5 checksum: 821 c27125e2804aee56cbc72c49944f1f3d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27-2sarge1.diff.gz Size/MD5 checksum: 1515447 832ee00211a2df22a91ae4ba1ee6ec2a http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27.orig.tar.gz Size/MD5 checksum: 503981 14cfa98beb29c47b080c7b58a7e7ecb2 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge4.dsc Size/MD5 checksum: 1131 df39d9eb3665bde335c73e8f5b79c41f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge4.tar.gz Size/MD5 checksum: 1464290 1d6901e2c966af9664f6927b5132e032 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge3.dsc Size/MD5 checksum: 732 2b9eb5951e8845d997b09d2c6e5c093b http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge3.tar.gz Size/MD5 checksum: 18478 138bcb10c41d699d8da5ce0d57a99f9c http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge3.dsc Size/MD5 checksum: 750 d2fe1fdb6e3eec91a14a5c04a2771100 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge3.diff.gz Size/MD5 checksum: 4643 f12edff362c684cb55148ba303ab3110 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301 http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge3.dsc Size/MD5 checksum: 1012 d336248751eb3dc712d735db94f17446 http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge3.tar.gz Size/MD5 checksum: 15979089 aa21b1d250b7b2e738a73504e99dcd2b http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.dsc Size/MD5 checksum: 621 91dc07d5678dc04fa77ee3f082e042c8 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.tar.gz Size/MD5 checksum: 28939 8308d8932bf9aea671d3644975c7dda2 Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge4_all.deb Size/MD5 checksum: 3581526 02b22e7928c2c1492ac09027470522d5 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge4_all.deb Size/MD5 checksum: 700932 80d41a68d88ee856986bb8bcfe9bc793 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge4_all.deb Size/MD5 checksum: 31037234 534b6b2271445072053134883c3d751d http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge4_all.deb Size/MD5 checksum: 27318 ea7848043c9df3a95da9e5095da5893b http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27-2sarge1_all.deb Size/MD5 checksum: 532268 fe433204c47dce4edcc3e7663e440fc2 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge3_all.deb Size/MD5 checksum: 2420420 d94901322ed779ac670e135a8440b2e0 http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge3_all.deb Size/MD5 checksum: 4760662 5855e76c47690b0dfa70785b6a1f2ca3 http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge3_all.deb Size/MD5 checksum: 9546576 87996510de39b3ac23aa15f36914cf1c http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge3_all.deb Size/MD5 checksum: 31108 1f6afea14eb6b21550cde51ceeddb00c http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge3_all.deb Size/MD5 checksum: 31332 c387c541a6787dbc7ff417d160cef59b http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge3_all.deb Size/MD5 checksum: 632064 92edcc1b25a875e5c30737a2fe70c531 http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge3_all.deb Size/MD5 checksum: 16616 f24ac7d25eb5121f09bc28b4ed9f3b1a http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge3_all.deb Size/MD5 checksum: 117730 94e132e19815fc68558a470a6c81e877 Alpha architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge4_alpha.deb Size/MD5 checksum: 7632 2445e35987d49ac25d54e03f4d812278 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge4_alpha.deb Size/MD5 checksum: 4574146 d4f40822ff7d2b81745fcbad93c6c681 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb Size/MD5 checksum: 272884 7441b62133c6f10e2556ec0703912049 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb Size/MD5 checksum: 274864 9f1fff33bda8359a29401dfb5a68ae26 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb Size/MD5 checksum: 16530564 e35e28151550092e60061c6f02bb73e7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb Size/MD5 checksum: 16981142 b4e1b2a3e0a5536b0af285ecb8c06b02 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_alpha.deb Size/MD5 checksum: 20030 0cecb3666ee659837fbe610c39c61e32 AMD64 architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_amd64.deb Size/MD5 checksum: 16798 30e9f8cb575c9a89228ec3358570f9b3 ARM architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 466036 0ec1622badaf906ebe04c4e9664120ba http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 4659450 70550ea501a0f66d8b28b4188a6cd3ae http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 1694270 7313913662a26b45d228fbe6f1c83a99 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 1058586 8147420a25a14158dc1f8d3445a2a430 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 7338878 890a70f30487bfad6d30c5b8fee6e796 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 3150260 d6e2d089dedb4eb6a7f769890c3edeca http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge4_arm.deb Size/MD5 checksum: 3673250 704fc370fc395d231914fd7fa5cfdd43 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_arm.deb Size/MD5 checksum: 18422 0c56ce3bb0e4f77b64c8a980a0e27f12 HP Precision architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_hppa.deb Size/MD5 checksum: 18820 509ab877c25a81e5ab2080fc65ee8ee0 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 10110 602c8ca8fb370ee253db8336f26c99c7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 1824668 da5f7095dd33c721a38893502e625979 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 298730 6dab70747a06a41255021d7e1285acd5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 299722 9e1a30002ad3880b2060210b7d2208aa http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 299878 f76659d1243043578de452963ede6e46 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 301510 f0a217bab1ef540c24d48a90e6b266bf http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 299110 40eba95c72df0de2be570161bc0d46bb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 299656 8e1456b82b4402781c285f1b9e8011f8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 301494 34dfd2fbc0d0957dac92cfe4485a7563 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 11051542 b20eeb3c509ba498bebc9e715491b456 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 12035042 7918144e5aa082597a924bd586faba2c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 12352942 65d58be41a7887ea54af9627e454232f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 12692654 07275530155e3c813ad444d94484284d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 11722988 0289fe967373e95f580b770c85b1d23a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 12095314 f91cb833aa97fa8a24529ae40343fd24 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 12433462 dc6e39a89aed9d04aa96e77992741d29 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 269552 3e5f1d99455c3d8fb148d0385eb50dbe http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 294448 3ed90f48e0bc6e3122acd6d9f1e2d393 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 300280 90f3bf91543bae03fc9a58b7da0cbbd2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 306010 883ff5c2940b58e2add0da99249f3af7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 288252 87dde248ef2f3fc8b54b318b6b300bc0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 294146 713aaebe3caf1c8d34d8863b2df483dd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb Size/MD5 checksum: 299096 f85e32d1715f76577e0012a393a8aa53 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_i386.deb Size/MD5 checksum: 16156 00845cf1a994cbbc869b733884059a83 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb Size/MD5 checksum: 4772038 238e18da8cd8497ed37668733ca0d7f7 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb Size/MD5 checksum: 11306880 9dae592d44791ef0aa752ed27dbaa2bd http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge3_i386.deb Size/MD5 checksum: 7769788 f560d9bbbaea787f7dd4bf594938d59c http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4_i386.deb Size/MD5 checksum: 12000944 db0b06c129d5906ee5a5573415d1f352 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 7058 ac95d0b4257544a67458180f58904168 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 4689188 8819e9547726fb46d789fb79ee4972b8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 242178 8b098d01b8dc91fc9fd24158299835c5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 242848 641d59723ee16c39060a582733942052 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 241912 5043864a5e6270796fc1dbb4b48e4e87 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 242750 6061b8a357fe2c78c65d11171a234031 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 6830 34f798cebe568b05b68730248db1fac7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 6838 d30b496f7f7b5bd63f5c3af74a2b0bfc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 6858 7bc187acabee9b6f036674f77f531435 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 6874 776a1bf241883d1c568a84a753ee3eab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 16676426 b0727c1d58545f67348da625615c6959 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 17033308 15424feb7e8d7197b446bc1d7f262f01 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 16628074 2f409b542f17fef3d0648f894dcccb99 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge4_ia64.deb Size/MD5 checksum: 16986728 04ec0557d7babf7d2f6faed8a4f1dafb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_ia64.deb Size/MD5 checksum: 21784 deb8adf7f5a2c3f125e88b72f4e5d806 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2641912 6f4a895ce13d72b0012e4c20e29d0b1d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2545082 4f6d92555461e4516f33240ffbeaa0bc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2396292 ecb64193223ba0a1921bada3b108bd0d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2478100 9ced9b8f0291c9805b4030953fc4af29 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2325564 f465bf68703f087c24ed94a25a009b94 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2396996 88f45b3a8ea54a1cd0a88754fa3ed325 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge4_m68k.deb Size/MD5 checksum: 2262170 aeb89e3e22cb2e10da5be7eeb6d673d7 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_m68k.deb Size/MD5 checksum: 15900 8194eb4c394619f08126a208122ce6ec Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-1_mips.deb Size/MD5 checksum: 4681070 bfd674644d49ee349ff89e8f3573c030 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-1_mips.deb Size/MD5 checksum: 3853598 43d8c06798ce14150978c69cba964434 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-1_mips.deb Size/MD5 checksum: 3856622 749a60d3f39bf0eaad0fe1cfc3632863 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-1_mips.deb Size/MD5 checksum: 7184636 c6afad254628f4adb796b4c5d6f2a67e http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_mips.deb Size/MD5 checksum: 20004 df364bdfa0985c1370272c77d16d1bbb Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 4685964 5ed0170e31509ba6560a95f2b2185446 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 3036378 e296f6d8f89b809ac47fd5ee4740011a http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 2998372 6f1f552c294495e2ee4572f6ad35f118 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 4106222 163f1a722740ed7fc4ccf154cf315dbc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 2140966 516dd73ba557727eb471dcfe9f9931e8 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 7046056 62a2991b3dde5384371a0e5375d31839 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 4676792 0b903ffb7bcc90de74523d31bb30ac25 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_mipsel.deb Size/MD5 checksum: 20048 8ec6f018f91783e61e0f1128a15f5a7a PowerPC architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 142738 a9041a7e6fa2bdad090cdcd737664084 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 142582 f2c0b689ad22d64907d11ff119e1586c http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 156528 587e0541503c1a0c585d149e5f37f7f3 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 156816 238998f6e2d8bc9f5fc8a775d1941e34 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 156604 12f25b316bd25604209a3cbaf5fbd178 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 4683788 6f8daa7ee570ab03414c95fee28f750d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 4693896 7d9450ac7257cdc47a39029e470fdc51 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 4801492 c114b71fe46e45f2bc8d0cb115b82a47 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 2501708 241522d021e46710f0c09a42abb7e04f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 1818940 c48f4b10b6e887cc67bb44aafe719b58 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 13485830 3d2da4eb5cb59f34cdac15658c6631b9 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 12757364 a0081b92274d2565ea6a19dda1a96280 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 13792872 0204b3a7c7d1976383dd01e93f6104b2 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 65420 86eb08fe122937b2b5eca16d1daffc7e http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 10582 7e4db127bc2d2c1d37e7eda2c0d14f4d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb Size/MD5 checksum: 10502 1f96ad86ef5b1b7bf000d196d96544df http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_powerpc.deb Size/MD5 checksum: 18440 af6b6e949a6bd999654f4d978bc38811 IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge4_s390.deb Size/MD5 checksum: 4579242 1507d4fa17cf60c0a618a3c1bb47cf88 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge4_s390.deb Size/MD5 checksum: 2780816 81c27854e61828072cde83feeb6114c2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge4_s390.deb Size/MD5 checksum: 995236 29e81e95c729baa1e4068d048160e9f6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge4_s390.deb Size/MD5 checksum: 2973100 41c6473b350b47b4652df8c3ec194647 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_s390.deb Size/MD5 checksum: 18896 3ad4aed59201a28ee2e9908acbd4a029 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 10116 59b85820309273cb2a3d4fb37ad675d1 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 2024562 fe43768fc817da675a784ecc53a78eb4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 163918 efddcf277ffeb9b83f6cacbcdf6e3f64 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 165746 5ecda633027cae3f0515ff7055371e12 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 202354 1abd15b240f7b7a6c3a2f245b69396b5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 203690 677b6e40982ec286185a02dfbadc2ec7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 3603836 aa1f8cf8b8ce570adecc45a2b1d75935 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 3791704 04e3a6d2bf535c163f28fcc75a7d296b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 6383944 b7d97b37f35d18ef38e65407858db330 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge4_sparc.deb Size/MD5 checksum: 6549170 84cd3c946a1b3dbe7c8ca248df33b19b http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_sparc.deb Size/MD5 checksum: 17730 3ad6d5b885f7424cfc67c591b695fe89 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFF3rMW5ql+IAeqTIRAiw/AJ0WfYW+JPIcteA05Nk7bLDzb+qFFQCgij2r HLMm3QpviVKm5uAuYRCPKnA= =d9kT - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 1184-1 security@debian.org http://www.debian.org/security/ Dann Frazier September 25th, 2006 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : kernel-source-2.6.8 Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2004-2660 CVE-2005-4798 CVE-2006-1052 CVE-2006-1343 CVE-2006-1528 CVE-2006-1855 CVE-2006-1856 CVE-2006-2444 CVE-2006-2446 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468 CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4535 CERT advisory : VU#681569 BugTraq IDs : 17203 17830 18081 18099 18101 18105 18847 19033 19396 19562 19615 19666 20087 Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2660 Toshihiro Iwamoto discovered a memory leak in the handling of direct I/O writes that allows local users to cause a denial of service. CVE-2005-4798 A buffer overflow in NFS readlink handling allows a malicious remote server to cause a denial of service. CVE-2006-1052 Stephen Smalley discovered a bug in the SELinux ptrace handling that allows local users with ptrace permissions to change the tracer SID to the SID of another process. CVE-2006-1343 Pavel Kankovsky discovered an information leak in the getsockopt system call which can be exploited by a local program to leak potentially sensitive memory to userspace. CVE-2006-1528 Douglas Gilbert reported a bug in the sg driver that allows local users to cause a denial of service by performing direct I/O transfers from the sg driver to memory mapped I/O space. CVE-2006-1855 Mattia Belletti noticed that certain debugging code left in the process management code could be exploited by a local attacker to cause a denial of service. CVE-2006-1856 Kostik Belousov discovered a missing LSM file_permission check in the readv and writev functions which might allow attackers to bypass intended access restrictions. CVE-2006-2444 Patrick McHardy discovered a bug in the SNMP NAT helper that allows remote attackers to cause a denial of service. CVE-2006-2446 A race condition in the socket buffer handling allows remote attackers to cause a denial of service. CVE-2006-2935 Diego Calleja Garcia discovered a buffer overflow in the DVD handling code that could be exploited by a specially crafted DVD or USB storage device to execute arbitrary code. CVE-2006-2936 A bug in the serial USB driver has been discovered that could be exploited by a custom made USB serial adapter to consume arbitrary amounts of memory. CVE-2006-3468 James McKenzie discovered a denial of service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. CVE-2006-3745 Wei Wang discovered a bug in the SCTP implementation that allows local users to cause a denial of service and possibly gain root privileges. CVE-2006-4093 Olof Johansson discovered that the kernel did not disable the HID0 bit on PowerPC 970 processors which could be exploited by a local attacker to cause a denial of service. CVE-2006-4145 A bug in the Universal Disk Format (UDF) filesystem driver could be exploited by a local user to cause a denial of service. CVE-2006-4535 David Miller reported a problem with the fix for CVE-2006-3745 that allows local users to crash the system using via an SCTP socket with a certain SO_LINGER value. The following matrix explains which kernel version for which architecture fixes the problem mentioned above: stable (sarge) Source 2.6.8-16sarge5 Alpha architecture 2.6.8-16sarge5 AMD64 architecture 2.6.8-16sarge5 HP Precision architecture 2.6.8-6sarge5 Intel IA-32 architecture 2.6.8-16sarge5 Intel IA-64 architecture 2.6.8-14sarge5 Motorola 680x0 architecture 2.6.8-4sarge5 PowerPC architecture 2.6.8-12sarge5 IBM S/390 2.6.8-5sarge5 Sun Sparc architecture 2.6.8-15sarge5 FAI 1.9.1sarge4 Due to some internal problems kernel packages for the S/390 are missing and will be provided later. For the unstable distribution (sid) these problems have been fixed in version 2.6.18-1. We recommend that you upgrade your kernel package and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge5.dsc Size/MD5 checksum: 812 b693fc8bbad53791662bf9c658883653 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge5.tar.gz Size/MD5 checksum: 40132 35e177d76bce7e3734e26ba3920412c4 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge5.dsc Size/MD5 checksum: 1103 3babaf0fab68f89b89bbe32b4eb5cc86 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge5.tar.gz Size/MD5 checksum: 77603 8a44e1f45213ef3a263b5f4934885cee http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge5.dsc Size/MD5 checksum: 1008 d8d58bc88487d599fd9479e68c72268c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge5.tar.gz Size/MD5 checksum: 68554 a69d4a4cd584136ab90b331de132264d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc Size/MD5 checksum: 1047 108b890101a8cbe3a4cba4330775dddc http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz Size/MD5 checksum: 91797 0a1f8d61b3b360a899f311506a5ed479 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge5.dsc Size/MD5 checksum: 1191 b0603843539a0a75ccb286f2ace930c7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge5.tar.gz Size/MD5 checksum: 65230 bad61e9854bff8ec53156d31839ee147 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge5.dsc Size/MD5 checksum: 874 5a64d7ec2a16eeddbecb943b563a00e1 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge5.tar.gz Size/MD5 checksum: 18371 31002e1be5f792aaa5a8e3b85b85663e http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge5.dsc Size/MD5 checksum: 1036 765f929fe270cadfdde4411f2dcdce9a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge5.tar.gz Size/MD5 checksum: 27915 ecdad48fe56a34c5912417d96c456ecd http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.dsc Size/MD5 checksum: 1072 fa7d3a7c2190d2d9c2d2e0010f37d055 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.tar.gz Size/MD5 checksum: 27874 1e9e1b1fa66ed32cddfddc13f567cce9 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5.dsc Size/MD5 checksum: 1002 ccd454121194183d44b49916c25c6480 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5.diff.gz Size/MD5 checksum: 1057522 6d623f68b9f4558b0e453f17c1129b34 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.dsc Size/MD5 checksum: 621 91dc07d5678dc04fa77ee3f082e042c8 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.tar.gz Size/MD5 checksum: 28939 8308d8932bf9aea671d3644975c7dda2 Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge5_all.deb Size/MD5 checksum: 6190814 ff156b96da5b482d2c279858377162ae http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge5_all.deb Size/MD5 checksum: 1103964 b81e9832dfd7f8489a9aed122493a640 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5_all.deb Size/MD5 checksum: 34943256 8b10f7c83c981cc311e68c61b5d8ad87 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge5_all.deb Size/MD5 checksum: 36142 dad58738d77db061e566e2212047b1cb Alpha architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge5_alpha.deb Size/MD5 checksum: 2761050 9d86fcd3e98d5ace83075d80a02ce729 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb Size/MD5 checksum: 233202 e922e9573a48d6dd5f46833bf6f029b7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb Size/MD5 checksum: 228180 ab00a15f66b44efbb1c3737ab9dcce89 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb Size/MD5 checksum: 20232948 80af39fd4ba73bfbd29da9f57c4d5dba http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb Size/MD5 checksum: 20090338 a73fdf837233ca593e5d1b853227751d AMD64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 2723802 639f7076be8f340d8e005815d5ca6640 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 227250 a39a03866acc6c318a16bbb25213a322 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 226276 ff591e5d5ad1e6bf2ec320cd0516c238 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 222420 ce42d0ccc255c240e16d29cd21a4d2e8 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 224178 cd7218fb598b6ac4d58fcee42c7b60e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 220764 d0a50d034e989c60ee351533244f9a71 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 12569560 d809f930a0b51a0d26f095444a2b3e69 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 13266594 5fd0aad813cf4bc8de8c696e19a8a764 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 13228726 26e93dbdc9d1742912fdf1f7869755db http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 13073122 ca9e7b8095060f012e0ca8272dc1bdc3 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_amd64.deb Size/MD5 checksum: 13050722 7d076b5f5b577b96c64728b27c86ea17 HP Precision architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 2803540 cb1f020f91b4f2974f3c023ec977a674 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 212636 2adf00a3f1623f6a6d0f5c41b9e8a142 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 211998 d4353bc65e679d48d75591338d24f499 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 211516 c16b01ba0c4ccfbb560c5aa150f128f5 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 210996 7d1ea9036e5c5e250d8a779d7bc5a5d2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 16035106 63a000baa3c5accde72fc52c52c7e8ea http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 16940902 9eb05566a4efd13f4dcdfc35300d1b62 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 17487200 3c3df7721c30bcb9120da11ec0e05508 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb Size/MD5 checksum: 18317352 cc62eb70d336e643e89b98a56f192219 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 2723796 4417c8fbc0a5fc8c57f44b3224333c73 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 227238 ce873c665e873e0e64eb0326ee759044 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 226282 0e40b1f1483cec93a07277b91648e1ae http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 222382 4b01f2e5d84ab049b4775bbe00e96c30 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 224170 7996b833450f8a189094abbb7a16a456 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 220744 668f08d37f554035097bf12f3e0aa7f5 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 12570136 c47c0307b74ff3ad96e428f072ddc21c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 13268342 aa7178f0eba544ecb5eb09daa8fa4464 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 13228902 61cb755d2fefbee646f59cb8b067d180 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 13227150 7d4e7cc50ee13c04cea3676578a8d5eb http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 13202148 c986a7533859313f32a16107e4cc48fa http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 2780616 88c40c053096833cee36f9e0d2fd2a37 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 259552 a6516c9058aadfbcf924c9fba2092ffe http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 257412 5c464a4529417364dc7a9b0f900bbf90 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 254580 a037ecae10f6459f542966e042895452 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 257586 34e1f86815969d0622214cf91e214ea1 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 254796 ac9cb9744cb60dd5038aca92254a8499 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 14066300 7ded56e75941f998756b3f6711c4021e http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 15549728 b0648b5e62974dd803214b7633b468b9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 15384062 6cbcc15f94b986b2ece57101db195fbc http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 15271760 98db653b59db10b9126600d9408c00ca http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb Size/MD5 checksum: 15162058 25f84f36f5583bc65f7996c17ac27bfb http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4_i386.deb Size/MD5 checksum: 12000944 db0b06c129d5906ee5a5573415d1f352 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7790 441986d03a7ecac076921a2dc204dde5 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7862 1b609adbf938b585c6375158a0f938ec http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7822 4f5c9899b996ad86bb384899c900875e http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7892 32dae7eeac53f9828b9209f88e46f350 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 3100286 0d50f6db944de51b032e1a558b65989b http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 201372 2d9bce2e35bb6400d5d80057b7f45898 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 201182 01f5d1d5d4fe0986aac04973725f70ab http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 201162 1440ce8f6781a08ce1648925cb35e34d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 200724 8cb4f893d1c76828e22f642a35039c6f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7786 2ae8d5d742deec64baaecd1b95c41f2f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7850 75c09ccecc2fbfd1367e9b2375eb3aa2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7818 4243fb7dc34f99cefd673bb3cee6a47d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 7884 6eb5b2f29bb67004a043abe8651fe1a4 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 21486196 30e43a7b123a1c1cb04a2669138b525b http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 22141992 cef3005a14538dc6cc756a478897f080 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 21414114 8e0689d56a8ffff7b24120fcdc563b4d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb Size/MD5 checksum: 22159010 ab8b47e398096642e3d77f88fa7afa48 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 3306528 1fcf6d780313788df48c6effd284afa4 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 3104468 f549bdc0c4425dbf2e4754c71f337681 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 3016322 4265aaca4ba1d14344da0ab7e389b057 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 2988544 a33d9385ec84d450e2cfd8b7c096d877 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 3175518 768425faa8c9fd6a576b72be587509a3 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 2980276 79b41b28f663e562d8178edff85ff308 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 3050078 a0ec5ab5ef0a2974b2a53cdd3e96ea72 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 3110846 4d1977a0d5beb7743e19a97d01319233 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge5_m68k.deb Size/MD5 checksum: 2995694 2f49e2b7d119fdff8ec195ac6e9f619a PowerPC architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 408454 3e43c58ba6b0c1738e8e07121f5186c3 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 408416 99ef4e1c8ac0e2204d5f267b9caa324b http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 407746 85a0f87adab8eb919165211fb214d996 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 407666 cbf0d53d33c920c369c7716efc61fcb1 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 407996 4470cf088d76a24982a4fa705b0956f4 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 407812 e5cb49fc122ef93c3b568630c53ba13d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 5149114 cf66501fd8f1e1e4e98c44fbe60ce62b http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 13586572 accb6b5d125e19467b801525e2479e7f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 13938498 ef41199d6ad8d30614c8cf12db99ff93 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 13570412 f522d52c8098621be06b4bb9d3c31f8f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 13927512 ffc2d49a03a912816a21036f7221d6dc http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 13602626 8288b7056a059275070ddb6eabcea52b http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb Size/MD5 checksum: 13859172 192bd75b60329cf4ea3f51c244216728 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 6358 4205daad6d320287142995acd7e065e5 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 2891752 d2e8787c5d659372c3859316b7af9ebe http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 111256 8fd0a9dad476d362c71906cafe1e8bda http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 146126 895ba69ef78dd93b423b132d077fc8b9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 146650 84095db294e9d0d22198415e9efd3928 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 4555508 24ca6b4ffef8dcfe36a19e20671f177c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 7434812 8386ec5b36e60a6fb11c90c2dd75c1e3 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb Size/MD5 checksum: 7637248 ca48b2ebaf5357162c16f3ae21f32624 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFF94/W5ql+IAeqTIRAu5aAJ9WW05SMthTZylKo1LEOH8l2p2/JACcDXCz A313BrBGWCscBksS/Cyf0c8= =mfCY - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRRh6aih9+71yA2DNAQKZmAP9EyZj2LHhmIH2QJwyWkQHSWqw5Q8EVeux jEXFhnPX/1aSCvaXmSRpkWOzSTouh+kBuluu0NnY6WyAvd42qd+zwjGwV1ozE8rI HXJ16YekYzkYaW5D2YAQRa+YVZhBmW2cdGuilJcsC/1SfV3uOTLjw3b2J4cbhyrc T7TH6w2BhJo= =wJiE -----END PGP SIGNATURE-----