Debian: New Linux 2.6.8 packages fix several vulnerabilities

    Date25 Sep 2006
    CategoryDebian
    3391
    Posted ByLinuxSecurity Advisories
    Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2660 CVE-2005-4798 CVE-2006-1052 CVE-2006-1343 CVE-2006-1528 CVE-2006-1855 CVE-2006-1856 CVE-2006-2444 CVE-2006-2446 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468 CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4535
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1184-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                               Dann Frazier
    September 25th, 2006                    http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : kernel-source-2.6.8
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE IDs        : CVE-2004-2660 CVE-2005-4798 CVE-2006-1052 CVE-2006-1343
                     CVE-2006-1528 CVE-2006-1855 CVE-2006-1856 CVE-2006-2444
                     CVE-2006-2446 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468
                     CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4535
    CERT advisory  : VU#681569
    BugTraq IDs    : 17203 17830 18081 18099 18101 18105 18847 19033 19396
                     19562 19615 19666 20087
    
    Several security related problems have been discovered in the Linux
    kernel which may lead to a denial of service or even the execution of
    arbitrary code.  The Common Vulnerabilities and Exposures project
    identifies the following problems:
    
    CVE-2004-2660
    
        Toshihiro Iwamoto discovered a memory leak in the handling of
        direct I/O writes that allows local users to cause a denial of
        service.
    
    CVE-2005-4798
    
        A buffer overflow in NFS readlink handling allows a malicious
        remote server to cause a denial of service.
    
    CVE-2006-1052
    
        Stephen Smalley discovered a bug in the SELinux ptrace handling
        that allows local users with ptrace permissions to change the
        tracer SID to the SID of another process.
    
    CVE-2006-1343
    
        Pavel Kankovsky discovered an information leak in the getsockopt
        system call which can be exploited by a local program to leak
        potentially sensitive memory to userspace.
    
    CVE-2006-1528
    
        Douglas Gilbert reported a bug in the sg driver that allows local
        users to cause a denial of service by performing direct I/O
        transfers from the sg driver to memory mapped I/O space.
    
    CVE-2006-1855
    
        Mattia Belletti noticed that certain debugging code left in the
        process management code could be exploited by a local attacker to
        cause a denial of service.
    
    CVE-2006-1856
    
        Kostik Belousov discovered a missing LSM file_permission check in
        the readv and writev functions which might allow attackers to
        bypass intended access restrictions.
    
    CVE-2006-2444
    
        Patrick McHardy discovered a bug in the SNMP NAT helper that
        allows remote attackers to cause a denial of service.
    
    CVE-2006-2446
    
        A race condition in the socket buffer handling allows remote
        attackers to cause a denial of service.
    
    CVE-2006-2935
    
        Diego Calleja Garcia discovered a buffer overflow in the DVD
        handling code that could be exploited by a specially crafted DVD
        or USB storage device to execute arbitrary code.
    
    CVE-2006-2936
    
        A bug in the serial USB driver has been discovered that could be
        exploited by a custom made USB serial adapter to consume arbitrary
        amounts of memory.
    
    CVE-2006-3468
    
        James McKenzie discovered a denial of service vulnerability in the
        NFS driver.  When exporting an ext3 file system over NFS, a remote
        attacker could exploit this to trigger a file system panic by
        sending a specially crafted UDP packet.
    
    CVE-2006-3745
    
        Wei Wang discovered a bug in the SCTP implementation that allows
        local users to cause a denial of service and possibly gain root
        privileges.
    
    CVE-2006-4093
    
        Olof Johansson discovered that the kernel did not disable the HID0
        bit on PowerPC 970 processors which could be exploited by a local
        attacker to cause a denial of service.
    
    CVE-2006-4145
    
        A bug in the Universal Disk Format (UDF) filesystem driver could
        be exploited by a local user to cause a denial of service.
    
    CVE-2006-4535
    
        David Miller reported a problem with the fix for CVE-2006-3745
        that allows local users to crash the system using via an SCTP
        socket with a certain SO_LINGER value.
    
    
    The following matrix explains which kernel version for which
    architecture fixes the problem mentioned above:
    
                                         stable (sarge)
        Source                           2.6.8-16sarge5
        Alpha architecture               2.6.8-16sarge5
        AMD64 architecture               2.6.8-16sarge5
        HP Precision architecture        2.6.8-6sarge5
        Intel IA-32 architecture         2.6.8-16sarge5
        Intel IA-64 architecture         2.6.8-14sarge5
        Motorola 680x0 architecture      2.6.8-4sarge5
        PowerPC architecture             2.6.8-12sarge5
        IBM S/390                        2.6.8-5sarge5
        Sun Sparc architecture           2.6.8-15sarge5
        FAI                              1.9.1sarge4
    
    Due to some internal problems kernel packages for the S/390 are
    missing and will be provided later.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 2.6.18-1.
    
    We recommend that you upgrade your kernel package and reboot the
    machine.  If you have built a custom kernel from the kernel source
    package, you will need to rebuild to take advantage of these fixes.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge5.dsc
          Size/MD5 checksum:      812 b693fc8bbad53791662bf9c658883653
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge5.tar.gz
          Size/MD5 checksum:    40132 35e177d76bce7e3734e26ba3920412c4
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge5.dsc
          Size/MD5 checksum:     1103 3babaf0fab68f89b89bbe32b4eb5cc86
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge5.tar.gz
          Size/MD5 checksum:    77603 8a44e1f45213ef3a263b5f4934885cee
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge5.dsc
          Size/MD5 checksum:     1008 d8d58bc88487d599fd9479e68c72268c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge5.tar.gz
          Size/MD5 checksum:    68554 a69d4a4cd584136ab90b331de132264d
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc
          Size/MD5 checksum:     1047 108b890101a8cbe3a4cba4330775dddc
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz
          Size/MD5 checksum:    91797 0a1f8d61b3b360a899f311506a5ed479
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge5.dsc
          Size/MD5 checksum:     1191 b0603843539a0a75ccb286f2ace930c7
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge5.tar.gz
          Size/MD5 checksum:    65230 bad61e9854bff8ec53156d31839ee147
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge5.dsc
          Size/MD5 checksum:      874 5a64d7ec2a16eeddbecb943b563a00e1
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge5.tar.gz
          Size/MD5 checksum:    18371 31002e1be5f792aaa5a8e3b85b85663e
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge5.dsc
          Size/MD5 checksum:     1036 765f929fe270cadfdde4411f2dcdce9a
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge5.tar.gz
          Size/MD5 checksum:    27915 ecdad48fe56a34c5912417d96c456ecd
    
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.dsc
          Size/MD5 checksum:     1072 fa7d3a7c2190d2d9c2d2e0010f37d055
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.tar.gz
          Size/MD5 checksum:    27874 1e9e1b1fa66ed32cddfddc13f567cce9
    
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5.dsc
          Size/MD5 checksum:     1002 ccd454121194183d44b49916c25c6480
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5.diff.gz
          Size/MD5 checksum:  1057522 6d623f68b9f4558b0e453f17c1129b34
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
          Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
    
        http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.dsc
          Size/MD5 checksum:      621 91dc07d5678dc04fa77ee3f082e042c8
        http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.tar.gz
          Size/MD5 checksum:    28939 8308d8932bf9aea671d3644975c7dda2
    
      Architecture independent components:
    
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge5_all.deb
          Size/MD5 checksum:  6190814 ff156b96da5b482d2c279858377162ae
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge5_all.deb
          Size/MD5 checksum:  1103964 b81e9832dfd7f8489a9aed122493a640
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5_all.deb
          Size/MD5 checksum: 34943256 8b10f7c83c981cc311e68c61b5d8ad87
        http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge5_all.deb
          Size/MD5 checksum:    36142 dad58738d77db061e566e2212047b1cb
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
          Size/MD5 checksum:  2757876 e94cdb8d12552d293018c7ca24199f47
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
          Size/MD5 checksum:   230608 fdf2cc6f010f2b618672422c3293f3b9
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
          Size/MD5 checksum:   225502 2a21bf8197792a789420b1838526186f
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge5_alpha.deb
          Size/MD5 checksum:  2761050 9d86fcd3e98d5ace83075d80a02ce729
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb
          Size/MD5 checksum:   233202 e922e9573a48d6dd5f46833bf6f029b7
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb
          Size/MD5 checksum:   228180 ab00a15f66b44efbb1c3737ab9dcce89
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
          Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
          Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb
          Size/MD5 checksum: 20232948 80af39fd4ba73bfbd29da9f57c4d5dba
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb
          Size/MD5 checksum: 20090338 a73fdf837233ca593e5d1b853227751d
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum:  2719948 51945c8ba3e5d86f81df067f73225201
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum:   224276 33205d1399f5df2dce3583f737fb528a
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum:   223300 bb55484a26b5a9a3fc01b68af37af569
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum:   219178 010a7d13b9c5546006b736caddcfb1b9
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum:   221054 c3674ad6b1c88ae5aa1c36c732fe1fe0
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum:   217440 22ab9501c6422fd3b160e27bf7a59d2d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum:  2723802 639f7076be8f340d8e005815d5ca6640
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum:   227250 a39a03866acc6c318a16bbb25213a322
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum:   226276 ff591e5d5ad1e6bf2ec320cd0516c238
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum:   222420 ce42d0ccc255c240e16d29cd21a4d2e8
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum:   224178 cd7218fb598b6ac4d58fcee42c7b60e6
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum:   220764 d0a50d034e989c60ee351533244f9a71
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
          Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum: 12569560 d809f930a0b51a0d26f095444a2b3e69
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum: 13266594 5fd0aad813cf4bc8de8c696e19a8a764
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum: 13228726 26e93dbdc9d1742912fdf1f7869755db
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum: 13073122 ca9e7b8095060f012e0ca8272dc1bdc3
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_amd64.deb
          Size/MD5 checksum: 13050722 7d076b5f5b577b96c64728b27c86ea17
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum:  2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum:   209500 8b284495343adf74bca8219421f4b48d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum:   208722 941a680674931ec594e3512c5736c9bf
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum:   208356 7ab2df2b04391d75500083585a96701b
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum:   207502 0a840281a00f4762978af411d7a3e7fb
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum:  2803540 cb1f020f91b4f2974f3c023ec977a674
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum:   212636 2adf00a3f1623f6a6d0f5c41b9e8a142
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum:   211998 d4353bc65e679d48d75591338d24f499
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum:   211516 c16b01ba0c4ccfbb560c5aa150f128f5
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum:   210996 7d1ea9036e5c5e250d8a779d7bc5a5d2
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
          Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum: 16035106 63a000baa3c5accde72fc52c52c7e8ea
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum: 16940902 9eb05566a4efd13f4dcdfc35300d1b62
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum: 17487200 3c3df7721c30bcb9120da11ec0e05508
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb
          Size/MD5 checksum: 18317352 cc62eb70d336e643e89b98a56f192219
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:  2719920 0984a4d0f8de19308e49bc822b2d7c71
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   224274 4faa8c6ee4aceae2ea01a2398c433599
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   223264 298ec2bb85e50e58b4e0ba131648e1b2
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   219174 d7422d17926f1e654627e08a71a8da94
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   220996 0433d7f8f2ce52acde87fd1518b1987c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   217432 f34fb2bc6f9986cc94b002385392ff98
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:  2723796 4417c8fbc0a5fc8c57f44b3224333c73
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   227238 ce873c665e873e0e64eb0326ee759044
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   226282 0e40b1f1483cec93a07277b91648e1ae
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   222382 4b01f2e5d84ab049b4775bbe00e96c30
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   224170 7996b833450f8a189094abbb7a16a456
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   220744 668f08d37f554035097bf12f3e0aa7f5
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 12570136 c47c0307b74ff3ad96e428f072ddc21c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 13268342 aa7178f0eba544ecb5eb09daa8fa4464
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 13228902 61cb755d2fefbee646f59cb8b067d180
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 13227150 7d4e7cc50ee13c04cea3676578a8d5eb
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 13202148 c986a7533859313f32a16107e4cc48fa
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:  2777236 af649947c652a9486461b92bbc33be8a
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   256920 88db1b684f215fdd35de0989f148b57f
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   254646 553205bb17cfc57f4c4a7aadff46650a
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   251590 51ebd6202b7f347f66df0e189b2a3946
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   254818 746967059979238eb49cfdcba572c07b
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum:   251708 33a61355c7a48d87b7570b772e454760
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:  2780616 88c40c053096833cee36f9e0d2fd2a37
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   259552 a6516c9058aadfbcf924c9fba2092ffe
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   257412 5c464a4529417364dc7a9b0f900bbf90
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   254580 a037ecae10f6459f542966e042895452
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   257586 34e1f86815969d0622214cf91e214ea1
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum:   254796 ac9cb9744cb60dd5038aca92254a8499
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
          Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 14066300 7ded56e75941f998756b3f6711c4021e
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 15549728 b0648b5e62974dd803214b7633b468b9
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 15384062 6cbcc15f94b986b2ece57101db195fbc
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 15271760 98db653b59db10b9126600d9408c00ca
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb
          Size/MD5 checksum: 15162058 25f84f36f5583bc65f7996c17ac27bfb
    
        http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4_i386.deb
          Size/MD5 checksum: 12000944 db0b06c129d5906ee5a5573415d1f352
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7790 441986d03a7ecac076921a2dc204dde5
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7862 1b609adbf938b585c6375158a0f938ec
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7822 4f5c9899b996ad86bb384899c900875e
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7892 32dae7eeac53f9828b9209f88e46f350
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum:  3097054 691f7cd4d1b2f184e50ab566f20a13e4
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum:   198662 72e0e4b4331b8a600de3a98d6ac59a82
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum:   197920 6e19efeac81a2a9416328af58316c4cb
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum:   198394 6d946fcc7b1fcf88c9ee9a47f7015384
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum:   197828 8be7e8290bd8e7cf1b9c162c9e369b36
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:  3100286 0d50f6db944de51b032e1a558b65989b
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:   201372 2d9bce2e35bb6400d5d80057b7f45898
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:   201182 01f5d1d5d4fe0986aac04973725f70ab
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:   201162 1440ce8f6781a08ce1648925cb35e34d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:   200724 8cb4f893d1c76828e22f642a35039c6f
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7786 2ae8d5d742deec64baaecd1b95c41f2f
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7850 75c09ccecc2fbfd1367e9b2375eb3aa2
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7818 4243fb7dc34f99cefd673bb3cee6a47d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum:     7884 6eb5b2f29bb67004a043abe8651fe1a4
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
          Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum: 21486196 30e43a7b123a1c1cb04a2669138b525b
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum: 22141992 cef3005a14538dc6cc756a478897f080
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum: 21414114 8e0689d56a8ffff7b24120fcdc563b4d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb
          Size/MD5 checksum: 22159010 ab8b47e398096642e3d77f88fa7afa48
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  3306528 1fcf6d780313788df48c6effd284afa4
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  3104468 f549bdc0c4425dbf2e4754c71f337681
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  3016322 4265aaca4ba1d14344da0ab7e389b057
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  2988544 a33d9385ec84d450e2cfd8b7c096d877
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  3175518 768425faa8c9fd6a576b72be587509a3
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  2980276 79b41b28f663e562d8178edff85ff308
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  3050078 a0ec5ab5ef0a2974b2a53cdd3e96ea72
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  3110846 4d1977a0d5beb7743e19a97d01319233
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge5_m68k.deb
          Size/MD5 checksum:  2995694 2f49e2b7d119fdff8ec195ac6e9f619a
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:   408454 3e43c58ba6b0c1738e8e07121f5186c3
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:   408416 99ef4e1c8ac0e2204d5f267b9caa324b
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:   407746 85a0f87adab8eb919165211fb214d996
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:   407666 cbf0d53d33c920c369c7716efc61fcb1
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:   407996 4470cf088d76a24982a4fa705b0956f4
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:   407812 e5cb49fc122ef93c3b568630c53ba13d
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:   405670 bd347754ea8c4cee14686b207e6cf46d
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:   405666 1dec752373178a4aef51f74c6d917073
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:   405598 c39f371744ca92eec853ad8746f0f009
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:   405568 b346b94897fca3c678daadc99b515428
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:   405912 14475ec4cdc9b337ad2dc0ab3a772bdb
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:   405698 4c3c94aa9afb4e6d73986bbfa26484bb
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum:  5143830 3a6cd285eba77baae74a2a16f8029be2
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum:  5149114 cf66501fd8f1e1e4e98c44fbe60ce62b
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum: 13586572 accb6b5d125e19467b801525e2479e7f
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum: 13938498 ef41199d6ad8d30614c8cf12db99ff93
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum: 13570412 f522d52c8098621be06b4bb9d3c31f8f
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum: 13927512 ffc2d49a03a912816a21036f7221d6dc
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum: 13602626 8288b7056a059275070ddb6eabcea52b
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb
          Size/MD5 checksum: 13859172 192bd75b60329cf4ea3f51c244216728
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab
        http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
          Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:     3462 c68f0624f124db25f3a41f78432ca11c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:     6358 4205daad6d320287142995acd7e065e5
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:  2888690 29723527245a48a00e724c7366868ec9
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:   107974 788d40ca3a1a3f53b8b2cf4c1fc4badc
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:   142726 8719b1bf0d3aff36f7711d8979f87a7d
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:   143332 87bc055c575e3ec3ea44136ed44dff6a
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:  2891752 d2e8787c5d659372c3859316b7af9ebe
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:   111256 8fd0a9dad476d362c71906cafe1e8bda
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:   146126 895ba69ef78dd93b423b132d077fc8b9
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:   146650 84095db294e9d0d22198415e9efd3928
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:  4545570 00d7c7e1caef41efcbc198a282f2b9f2
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:  7428184 1f146c58f98331bf5826520379bacd33
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
          Size/MD5 checksum:  7622116 4de4c114879d82d79fc34cb93c070d43
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:  4555508 24ca6b4ffef8dcfe36a19e20671f177c
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:  7434812 8386ec5b36e60a6fb11c90c2dd75c1e3
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb
          Size/MD5 checksum:  7637248 ca48b2ebaf5357162c16f3ae21f32624
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.