-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                     ESB-2008.0969 -- [Linux][Debian]
           New Linux 2.6.18 packages fix several vulnerabilities
                              14 October 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              linux-2.6 kernel
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
                      Linux variants
Impact:               Denial of Service
                      Increased Privileges
Access:               Remote/Unauthenticated
                      Existing Account
CVE Names:            CVE-2008-4302 CVE-2008-4210 CVE-2008-3833
                      CVE-2008-3525 CVE-2008-3276 CVE-2008-1514
                      CVE-2007-6716

Ref:                  ESB-2008.0953
                      ESB-2008.0922

Original Bulletin:    http://www.debian.org/security/2008/dsa-1653

Comment: Only CVE-2008-3276 has an Access of Remote/Unauthenticated.
         
         This advisory references vulnerabilities in the Linux kernel that
         also affect distributions other than Debian. It is recommended
         that administrators running Linux check for an updated version of
         the kernel for their system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ----------------------------------------------------------------------
Debian Security Advisory DSA-1653-1                security@debian.org
http://www.debian.org/security/                           dann frazier
Oct 13, 2008                        http://www.debian.org/security/faq
- - ----------------------------------------------------------------------

Package        : linux-2.6
Vulnerability  : denial of service/privilege escalation
Problem type   : local/remote
Debian-specific: no
CVE Id(s)      : CVE-2007-6716 CVE-2008-1514 CVE-2008-3276 CVE-2008-3525
                 CVE-2008-3833 CVE-2008-4210 CVE-2008-4302

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2007-6716

    Joe Jin reported a local denial of service vulnerability that
    allows system users to trigger an oops due to an improperly
    initialized data structure.

CVE-2008-1514

    Jan Kratochvil reported a local denial of service vulnerability in
    the ptrace interface for the s390 architecture. Local users can
    trigger an invalid pointer dereference, leading to a system panic.

CVE-2008-3276

    Eugene Teo reported an integer overflow in the DCCP subsystem that
    may allow remote attackers to cause a denial of service in the
    form of a kernel panic.

CVE-2008-3525

    Eugene Teo reported a lack of capability checks in the kernel
    driver for Granch SBNI12 leased line adapters (sbni), allowing
    local users to perform privileged operations.

CVE-2008-3833

    The S_ISUID/S_ISGID bits were not being cleared during an inode
    splice, which, under certain conditions, can be exploited by local
    users to obtain the privileges of a group for which they are not a
    member. Mark Fasheh reported this issue.

CVE-2008-4210

    David Watson reported an issue in the open()/creat() system calls
    which, under certain conditions, can be exploited by local users
    to obtain the privileges of a group for which they are not a
    member.

CVE-2008-4302

    A coding error in the splice subsystem allows local users to
    attempt to unlock a page structure that has not been locked,
    resulting in a system crash.

For the stable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-22etch3.

We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

The following matrix lists additional source packages that were rebuilt for
compatability with or to take advantage of this update:

                                             Debian 4.0 (etch)
     fai-kernels                             1.17+etch.22etch3
     user-mode-linux                         2.6.18-1um-2etch.22etch3

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- - -------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch3.dsc
    Size/MD5 checksum:      740 493907f0ec1dd35b585f1d719b47c7a2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch3.dsc
    Size/MD5 checksum:     5672 fa1b554733916f434e7c5d2cbb14ef39
  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz
    Size/MD5 checksum:    14435 4d10c30313e11a24621f7218c31f3582
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
    Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch3.diff.gz
    Size/MD5 checksum:    18523 59f086bfef3cfc72e88f551f4af9be4e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch3.diff.gz
    Size/MD5 checksum:  5437298 bfacdfd59de2d0b136e7eb0581c16419
  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch3.dsc
    Size/MD5 checksum:      892 d977e436c0c36127480632bf12ddb409
  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch3.tar.gz
    Size/MD5 checksum:    56943 707244b97c9b0d88024b496383bb0506

Architecture independent packages:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch3_all.deb
    Size/MD5 checksum:  1107604 57829032ad200ca9074d0e4f577ea3eb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch3_all.deb
    Size/MD5 checksum:  3752990 125913abc11ee4691c2e9c2ca85828e4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch3_all.deb
    Size/MD5 checksum:  1644366 d520dd61b1d2bb622b96a44dac7f9c95
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch3_all.deb
    Size/MD5 checksum: 42131294 87ce8671d2c807ade72b46e7f6dc0865
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch3_all.deb
    Size/MD5 checksum:  3754174 0a103fd55592f07a55e679ae96f1948b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch3_all.deb
    Size/MD5 checksum:    56140 732c3c59bc25b82815cecd51a320ff27

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:  3054276 d826087276a424fbb1ad81c802387974
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum: 23845844 e9344fb88eb70bb76bb985e0af7b3295
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:   269534 6006da8b330092cc0ac438c651fbce62
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum: 23464990 de6f168daed02ebb44417923e1b2f62f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:    55546 4c6429d35a4e6e9dc51e0559360af454
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:   268658 3fb4e972a7fd4834aba10e11e764e94b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:   269990 8436e4bdd6a2cdea99dcdd35b0da02e6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum: 23486388 6fb64e236283a94d73ec7eea80138800
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:    55516 e06439eba55fe91ba9e71b71f756ab0d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:   269254 12a77e6e2f05431a343b5ed6c54eb19b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum: 23534930 8619ec3488e013bfe613f8d015981090
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_alpha.deb
    Size/MD5 checksum:  3029362 f08473149c47440b6227d09d0e15ec81

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:  3229080 ebaedc7b15374d82200bb313af591c60
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:    55536 47a85ca70eb5068cadb51ff02225f7ec
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:  1652628 d128f98a13149243e0aae71f9f2f6685
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:   278642 204882cbb72ba82bcd938a8a8b4e32ef
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum: 15357222 309753a5547fc7b9e8dc748f8bbc3c67
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:    55512 b62193c785780f5c3aada59941c7e3b8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:   279684 e3c1a582764e65cd584388b323655396
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:  3422742 6311093b8c6e3d9937a42045d24bcecd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:  1684502 fa8e66e1f210738195ac6eb0bb5ff72a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum: 15370500 44d4bd72faaa2be39558d9234057421c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:   278520 9370bc57284da5d47fc01666ee8123c3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:  3253014 007ae007d76e63035dd4445e06073f9d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum: 16909912 b4d9f4bba51bc4b007e0c054b5e8bfee
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:  3397686 19a7efe64f669c308c5e5e00f300d966
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:    55490 be308efe5131aa18d6418c324ea392b1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:   279372 14133db6a5c96edd5183939f18d15b65
  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch3_amd64.deb
    Size/MD5 checksum:  5962504 5f9079d21c3145385d9aec7247a11ff8
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum:    55500 0ba1c4ab6d90c2623a605217d6451a7b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch3_amd64.deb
    Size/MD5 checksum: 16956154 dba6ccbf6b4c67d22e27a09f6b229435

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:   200538 85ac04512111fb8e07bfe1eae6487612
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:   235282 4f683d7d482749a87df6ec0d52661e37
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:   205390 8e24788fe51b8a3503a688e4cc90fc73
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:  7567550 dec58358f3e2035f474924b08ca8d99b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:    55606 b42f6b7ecc488d2cd3c7ef193b784fad
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:  3411836 a3515cdee419d3c077ed5b706ffe2776
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:  4588534 5247b9647a133929d735308d97477ba3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:    55560 ca40290316254d87ecf671dbc117aa90
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:   241120 ddbcaa2cb972ff7481c306f5a41bba7d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:  8873060 29d86d0aa35d1d7473e874832dc8f8e0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:  7926286 7c9f8bf595c21daa62ba311abf12216d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:   234972 96d94555f7f2453ee00aa123bb0d02e5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch3_arm.deb
    Size/MD5 checksum:  5011070 12c57b052f2aac6bcd3dabfad0370b02

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum: 11004184 757f5e3b0dc568e6e7ee1f99f257df3f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:   197990 5b346a7a3aa3c4458c5a1acf38e627ca
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:   197554 c9ad690fba1faca31c3d4a6bda51ad3d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum: 11814132 cf93c7313b0279b4061d4ebc83db4ec4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:   196572 c7b680f3509e04a2185ad1f61e822052
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum: 11408424 555766d525822bf194cf30a4778308fc
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:   198720 a4cbd735b3afd48823272b5ab36282ce
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:  3023798 a741ee6be7a5eea2387dae7c4a1bf026
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:    55518 cc4dbfcfb37b0cd21a68afda1c515e12
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum:    55540 7df36a076bfc3128bef0449ef01c6c09
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch3_hppa.deb
    Size/MD5 checksum: 10557880 e289131a688bad589c05f28605fcbc8c

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   287584 fd1dc163f19f0e91f6181fd2a216c08f
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:    55544 fec1062dabd5653eb23ca85e73e131d4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   283390 05a5c2f6337e5d4ccbb05ec7ef1bd54f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   276876 8280de1d5dc44621340ec626ed887c73
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 14386944 91116df78124d95db880b0099ba4c163
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   283524 b8e0e678e6caab3d63a399553bf70f4f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16633996 dc7c497fefe7e614bb3d0b040a29b21b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   276496 abd89d26fdb548b3d82acbf89a755472
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16311514 3c9566afa6be4179e757addb42863f45
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16459068 09b95ca7ddcf239c79b93e62d1268e71
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   285138 de46394f114b3239acf7e8fcba274adc
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   284620 846955996794eccc7fcd2bcb0554a600
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:  3212666 f6b8d56dcd02239c14c189b0299d7248
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:  3229612 f851ba7bad6157f7054e518bc2d588ff
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16925100 2e8616eabf805dd216a4d1f179b13d3a
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:    55556 bc262dfe403adbdbf5b2238986824b07
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   284708 a8637ba74f82e30576564d9eae4bedda
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 14373074 dbe7bdf5bd3f84fd02365cbff71abeb4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:  1301400 febd590c24dddf8587eb7e31216d582b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16496844 4c27866f91817ae1ea03d39983ec2309
  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch3_i386.deb
    Size/MD5 checksum: 25590056 1ba96e25e6f23388195bbcdc0d0e4638
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:   277270 29f9bbfc4228cde4da350fe64decf7a8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:  3235862 2124609f4aeb2394f1cca3699f2cea26
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16593228 5726bd97ef666c9a83bdad2205909ad2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:  3116656 8a568c76241153f82ff38b37cb67e467
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:  1328480 1323d4613ff263fb2ee24172e0f72375
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum: 16533238 c95c05cb1d966c23904d5a8cbdddbb3c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:    55614 e3ca2424954bdf7a65347ba12130bb10
  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch3_i386.deb
    Size/MD5 checksum:  5506170 d68fe6cbab011b6a653e50f8ad28b626
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_i386.deb
    Size/MD5 checksum:    55554 cacf8a4005be33fee3b46c1f10c93f7b

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum: 28015618 66ddc9ed3dd68af7475656048b94aea0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum:   257120 e60ce286094a6c237fc5d14c52f70fef
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum:   257668 a6adb3712fb67169c94de0b393c50f5a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum:    55512 440920372181f036c3379e5cf823924e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum:    55532 f723ff3ec88d0e80fa3ae6cd3d600a67
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum:  3083412 f75cbaa10eec4fc77f92e79919fbb582
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch3_ia64.deb
    Size/MD5 checksum: 28181298 428b22221a15afe9b8a67e2aa5c93321

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:    55612 4d0d04f7433d2840190c1155cd9b7c25
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:  8312418 7e72b16616f5fa75d20ed9b86efb01cc
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:   168942 5387870d79df7426606819ac72177c0d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:   188570 96dbd2424f5137db6177c92e9c0d527a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:   164452 d35d93b7a7219281d61fb56ac9de6a68
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:  6125130 72d80afd3867fd6d454c9ba85dd1662e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:   188304 f3b6f8d584915e8811c3d7e940231895
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:  3415874 d99154264b0be24d52ddd7b47ea1f6f3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum: 15655138 f2502742bcc04fd56893d4f023777616
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:   156024 3ef2379579dbf106b49c1fe53d19f886
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum: 15681568 13e86c86184e3f641b4492d6d996c17c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:    55552 b5383e542051b3a484bdde9bc5bb84a7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch3_mips.deb
    Size/MD5 checksum:  9077696 bcb98ae9b771524d8594a8efcdd166ee

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:    55516 22c0d7f1ad87d687cf48ec85b00a54fa
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:  3351454 14b417ec1db6bb1f45e84d5e4c78c7f9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:  5928492 1c308b807ff932feaacd2e2ef29c5fba
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:   157228 44a302de92e30becb80f3eebd7e5fef8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:   151722 cddb8a8637cf0b0db49e6afffb105977
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:  6031532 6c1e1435a1ffe7a6b672ae0944ff1542
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum: 15028158 961ff8be868b5743a3eda99fb7766d30
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:   184266 f67be4ce5173fd26bf683ef49abb2929
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:   184210 112b7aec3379b5e0b1055174e4b9559d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:   157190 c6da670c8f9a233220bcf281f75285bb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:  9864522 9e20f89b4e8bc575dd9e80f22d58af1e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:    55576 fc6372bb9d4276ee09f4edb5d00353de
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum: 15058538 04b6135c28ce4317b195e58485afb55c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:   180124 2552fcd585b1cb2821074dfa8f6e2f79
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch3_mipsel.deb
    Size/MD5 checksum:  5946262 b4f6afe664c3c9eda5d688d9c2224f98

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   254956 317002d6655965bb2975d727e05e4ba1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 17017480 c3750940c286e1e0e044bf51fcc4d8e5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   254562 a7a4029fa40d52ec6abf2a5e4a1e728c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 15160640 8abd18eb45c3eb8d68443d28d5b22623
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   246708 0d4239a507552174c4641d75de7484d7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:    55522 5509396a2cfa51abfd572891587d8c25
  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch3_powerpc.deb
    Size/MD5 checksum:  3368162 afaebefbc64bdab1bf758b30494e7931
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   254470 72efdfa9e51f40abaf47ebd31ffbaced
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 16406552 7cc81318717697f2b6c12d23071f704a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:  3416180 ad33cad549736033d3169f8c1c129f3d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 16629132 b2017f0e3b1939529ab8d4582d89f5f4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   231022 ee9572606d58fcf3454dfa8eceda805d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:  3393862 463c5cffcaf1c8c5ea48e167de092356
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   254260 2993eeaa170c7e99ebc24e7cec22367a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 18356594 94ae7aa5b60b613717ff1d0733137692
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:    55566 36d816acb457a3e4de49e7cf3d357030
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum:   253240 ff30ba1570fac67d2855635f82aff16e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 16972404 8b70c569b12980926e9abd4c37253fbd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch3_powerpc.deb
    Size/MD5 checksum: 18298298 9d798107316a68adba95f61633139dd3

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:   145024 de96553151cc65cf6134537ca7a734f9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:   146346 ab90270f9aa45df4cc9228cc60a9e5bd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:  5621500 17ffc62f86e0ac8118173fad7e83b3ec
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:  2967682 aebed406f79ec162db1f74e30ca306c1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:    55510 b7c591cadb27b600a6f5ae253a818580
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:   145540 41f566029f0bad7076df699046e054fb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:  5663894 462fc406e73d11c9d2ce0a367cd6c8b1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:  5404140 14661fd4a1530565b6c7ceccdcfdc26b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:  1440380 dcee89fa2838ec7261e874cca16b11f3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:    55538 63a3d12c95d04b787fde91e89690a7b0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_s390.deb
    Size/MD5 checksum:  2944580 fdcf85d52c1ebd949fe7164e5e1b7230

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:   197042 8d2d386187bb36eb11c1eb07821e17c6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:  3169728 a5a913fc299cf5fb141e46fd553450b5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:   198580 53c2a36458380a093f927aac210f3710
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:   167168 f6e88cb63a04e1a0b2377e5945a16acb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:    55542 baa53ca6a29b4ef34b636beaf900eb5a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum: 10694850 65a85b0699a8dfbeceae17d7b68bc8ae
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:  6412910 7d52dc83fc859cab858c984fb3c8149a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum: 10648406 0b6d60d1fb3beeb4765384d8ca391fd6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:    55516 b4ca11fcad627035c0d7edbcaf9b3d13
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:   198004 75d0f7399cfb2682428fc82f2988a46c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum:  3192006 728c49781a59b0e841c8f4ddcc4de308
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch3_sparc.deb
    Size/MD5 checksum: 10394352 38a7423b99a866390f8d77c5dc4cdc86

  These changes will probably be included in the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFI861FhuANDBmkLRkRAn0IAJ9pk+rybAouFO5y/Xm5l24vMFtTwgCfToDo
DTZu19N8KfHtOHVThyhz1II=
=WtYo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSPPhKih9+71yA2DNAQKp2QQAkn7+1Ny+hHmqTcfmWWe2XBFnntsc8aSC
tYP194Zh+NVUtRgFxev77G3mszcDQh5bBysiduwJu2Mz32T6BeV/jPhtP5QBxbdj
wfAf57ZrS3o7DmWDW8ydVxXIPYR8QXiXM4QW9PeOdcAvF3aCf/HfHTySYF4qS7oK
RfOK6+EAh18=
=vTn7
-----END PGP SIGNATURE-----