summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.18.dfsg.1-13etch1
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2007-08-15 23:40:45 +0000
committerdann frazier <dannf@debian.org>2007-08-15 23:40:45 +0000
commit52e86115684a4d1b0dcae8c6cf347a81e44a700e (patch)
tree8d293b96b89dbc1366140e528d537167f3b04e99 /dsa-texts/2.6.18.dfsg.1-13etch1
parent35e4edb035bcfd2a777ffaa4583a50ec854038d4 (diff)
initial commit
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@913 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.18.dfsg.1-13etch1')
-rw-r--r--dsa-texts/2.6.18.dfsg.1-13etch1494
1 files changed, 494 insertions, 0 deletions
diff --git a/dsa-texts/2.6.18.dfsg.1-13etch1 b/dsa-texts/2.6.18.dfsg.1-13etch1
new file mode 100644
index 00000000..51c2edb7
--- /dev/null
+++ b/dsa-texts/2.6.18.dfsg.1-13etch1
@@ -0,0 +1,494 @@
+--------------------------------------------------------------------------
+Debian Security Advisory DSA 1356-1 security@debian.org
+http://www.debian.org/security/ Dann Frazier
+August 15th, 2007 http://www.debian.org/security/faq
+--------------------------------------------------------------------------
+
+Package : linux-2.6
+Vulnerability : several
+Problem-Type : local/remote
+Debian-specific: no
+CVE ID : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453 CVE-2007-2525
+ CVE-2007-2876 CVE-2007-3513 CVE-2007-3642 CVE-2007-3848
+ CVE-2007-3851
+
+Several local and remote vulnerabilities have been discovered in the Linux
+kernel that may lead to a denial of service or the execution of arbitrary
+code. The Common Vulnerabilities and Exposures project identifies the
+following problems:
+
+CVE-2007-1353
+
+ Ilja van Sprundel discovered that kernel memory could be leaked via the
+ Bluetooth setsockopt call due to an uninitialized stack buffer. This
+ could be used by local attackers to read the contents of sensitive kernel
+ memory.
+
+CVE-2007-2172
+
+ Thomas Graf reported a typo in the DECnet protocol handler that could
+ be used by a local attacker to overrun an array via crafted packets,
+ potentially resulting in a Denial of Service (system crash).
+ A similar issue exists in the IPV4 protocol handler and will be fixed
+ in a subsequent update.
+
+CVE-2007-2453
+
+ A couple of issues with random number generation were discovered.
+ Slightly less random numbers resulted from hashing a subset of the
+ available entropy. zero-entropy systems were seeded with the same
+ inputs at boot time, resulting in repeatable series of random numbers.
+
+CVE-2007-2525
+
+ Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
+ by releasing a socket before PPPIOCGCHAN is called upon it. This could
+ be used by a local user to DoS a system by consuming all available memory.
+
+CVE-2007-2876
+
+ Vilmos Nebehaj discovered a NULL pointer dereference condition in the
+ netfilter subsystem. This allows remote systems which communicate using
+ the SCTP protocol to crash a system by creating a connection with an
+ unknown chunk type.
+
+CVE-2007-3513
+
+ Oliver Neukum reported an issue in the usblcd driver which, by not
+ limiting the size of write buffers, permits local users with write access
+ to trigger a DoS by consuming all available memory.
+
+CVE-2007-3642
+
+ Zhongling Wen reported an issue in nf_conntrack_h323 where the lack of
+ range checking may lead to NULL pointer dereferences. Remote attackers
+ could exploit this to create a DoS condition (system crash).
+
+CVE-2007-3848
+
+ Wojciech Purczynski discovered that pdeath_signal was not being reset
+ properly under certain conditions which may allow local users to gain
+ privileges by sending arbitrary signals to suid binaries.
+
+CVE-2007-3851
+
+ Dave Airlie reported that Intel 965 and above chipsets have relocated
+ their batch buffer security bits. Local X server users may exploit this
+ to write user data to arbitrary physical memory addresses.
+
+These problems have been fixed in the stable distribution in version
+2.6.18.dfsg.1-13etch1.
+
+The following matrix lists additional packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+ Debian 4.0 (etch)
+ fai-kernels 1.17+etch4
+ user-mode-linux 2.6.18-1um-2etch3
+
+We recommend that you upgrade your kernel package immediately and reboot
+the machine. If you have built a custom kernel from the kernel source
+package, you will need to rebuild to take advantage of these fixes.
+
+Upgrade Instructions
+--------------------
+
+wget url
+ will fetch the file for you
+dpkg -i file.deb
+ will install the referenced file.
+
+If you are using the apt-get package manager, use the line for
+sources.list as given below:
+
+apt-get update
+ will update the internal database
+apt-get upgrade
+ will install corrected packages
+
+You may use an automated update by adding the resources from the
+footer to the proper configuration.
+
+
+Debian GNU/Linux 4.0 alias etch
+--------------------------------
+
+ Source archives:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.dsc
+ Size/MD5 checksum: 5672 ef2648e54c6ea1769b29ba191fc13083
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.diff.gz
+ Size/MD5 checksum: 5306139 589297d453d15848b5879cf22eed7d40
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
+ Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
+
+ Architecture independent components:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+ Size/MD5 checksum: 3585938 a94cd1247d3dc98378dd094b3b364044
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+ Size/MD5 checksum: 1081908 36d119bd92dbd35a8f83b191f74daf09
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+ Size/MD5 checksum: 1475708 0373ab2ac016f31d2591eab4de39e4d3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+ Size/MD5 checksum: 41417232 279c0d7b44a451169a118e0a2b0c4eeb
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch1_all.deb
+ Size/MD5 checksum: 3738202 e4cfce3e67d3a0f6aeb4fe1fb5706372
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+ Size/MD5 checksum: 51094 b22167a8b2ab8d0cfb9eded0d0b8d8a0
+
+ Alpha architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 3024210 ad1fc21ac8fcb76a0db86d25737c8a83
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 50680 28ad3748b8d76abbb2e896f7ff190240
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 50720 1f106b97c91e07921402b0a2174574c6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 263524 4ce1e83ad733aee9d36b075babc6f908
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 263838 4c9ebe648f73818252ed3de79567219e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 262864 a3d6389b9224fcef726128f3a747a4f8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 3048212 d86c3c8fac6533904b91592016e2afba
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 264300 15606dadab1e1bbb4d9234a8bfb09b5e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 23485186 1978fddd39e8e7ce9ebc88efefd4ebe0
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 23464818 bdfd39761fd0bc68de001efb430895af
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 23838852 e9ae2b4f056d9b47832234d2aa6ec4d7
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
+ Size/MD5 checksum: 23528772 4f029181ad02c46f2ae2b34038b629e0
+
+ AMD64 architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 3164562 5bef24546e02e53d0b866b68e57c8294
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 50644 173c9d06298afe48e609cd08a5420737
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 50668 61e625ce94855d474c0562819ae3b879
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 270036 cd6f518453e0b75e3d4e17bc1fca62a3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 3187796 2958630378a24cb3f16807e04fe17297
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 269650 dbfd4c56547401e7b6a6460f41dd266b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 3330944 996a5cba350ae0c9110f8ca72492bfc2
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 271784 c1841e07342a73c9cf87058cc0ca943b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 3353796 730dd7dd17cb532152463000f16459f0
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 270068 363ff82948e473032eaa4fc37d2b9d6b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 16838550 dee2a96f0c89bc9b59b2febd42dc8bb1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 1647400 8f72b372c132b40f5c828d7d0a94bf62
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 1679728 853224dc22a8fa38c8b4af6534886a77
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 15238676 d62ddc5e61a35e84529262c9101b0e93
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 15256142 8b0667dd7cb043b753ce3a9770058515
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 50618 0da191c5dcd2406d079f9aab3b4ca0a3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+ Size/MD5 checksum: 50632 46cd39c06556d9bc465099cddb3c7f3d
+
+ ARM architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 3346806 bc6581484d2364ccba4bbdb275072ecb
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 50652 976339e33b567d816811d561dc575cc8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 50694 19473ef72c0109f1ce9dc9dfd4f3de3d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 225038 969f487c6c9d50fef7200e0a3ecb5c4b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 226564 c5f03ec763dfb6b27d00f8f90e0ae9da
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 232748 bb9606e416b2aa84c3cc8071ac2350d8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 192126 cd01397be860265e013d55aa574c7347
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 194764 e05a0715a2bf9cbac171217b22314b19
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 7518754 018e9a847ff04f7fc3580f85bfc2abe1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 7869416 e4750e15d602443f08ba02c7e7c2a137
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 8806748 7436ed2118660e9c7f4f4697ac5868c3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 4558510 68d071f5a09c182509bea873aef02105
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb
+ Size/MD5 checksum: 4981066 6c261104c98cc528d6633f79274ad72a
+
+ HP Precision architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 2964238 f6fd8c5dd6071370f953e496756851cf
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 50642 8aca6d6bffa3b334b71b66332dd125ae
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 50668 7dfc3cbdd0f0763008e0246015fe5c9f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 188488 31502e1f9bdcc0a24d6a7762f6f4cbe8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 189420 e6deaa2c4a398b59a40a732cb9018940
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 189146 133d151b9aa064b61c90c0c9ce20656c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 189834 c7ada740b1647894ceda503d4ee8399b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 10498710 5d3ee84cc71a57eabe1d0647f704ad3c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 10940810 8e1de20ffcc7df26862544af83f78771
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 11344516 a6fe777a6d6296c1d95c81c25931102e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+ Size/MD5 checksum: 11751450 e0c73577059ad7ee24893278e8bb580c
+
+ Intel IA-32 architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 3164474 5581e6b60de382087f4e3cd05a326cd8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 277248 ff8b78d10cb79fc1c9258cd43a408499
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 275932 874d04ecd1f692d9781e2cb47c687ee6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 276286 dbcc90161edc6a46b7a89a10b0fc22ff
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 50640 34b3065eb0fdc3a02576c9ebdd2508d9
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 50700 77d1ae15ad63b7e9675225a6ca7db47c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 268294 a60191beaaf0d62099dbd1a20eaf6b75
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 275830 f9a83308d8ecd6eb36d6791b864116c5
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 3050892 8283afde8651de38ff35c68ac9d34feb
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 273688 759941012b1848db94e34d6f1c57cfd6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 273764 bc27c920b5a85c643d3f9a7fa3bb2f9f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 3145220 f0cee6bc58f389ef78fc3cbcad757197
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 270550 b1aca209d3f63334b8512bd70e7fee04
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 3167356 72a44aac33deb66d1eed41b37d9f6f84
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 271130 cebd78501825a595f992a575371cd8b7
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16170152 7dbf8514bc38e86a6d6454593628a9a8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16319248 a099f9f04a33385dc29a7cc5ed743411
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16384438 83d05912745de976a2648295241f0b15
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16816198 1c14cd0e4867b12f05bea602a7940b11
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16449650 9c195ec1b9f2b5f2531017389234d817
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16358054 727d0f2e6e821a34c527c44946660653
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 16488812 1619800305c3c55e48f9b5484cd7ec39
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 1296346 6f233c2b69738b9d577a4c1d7d9283a3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 1323270 c3ba3e1299340fe9666746ada15cafe2
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 14258314 37215c1b602209320153136ddae5b53d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 14272088 00cfea4d19109eff959c360f63b90c18
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 50620 3d60ebbd894ac77ddaafaaba903083b8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+ Size/MD5 checksum: 50636 9277c97ebb5c14fc93c5449c5e5a391c
+
+ Intel IA-64 architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 3078390 7c1dc7cf08fdce40fdb01acd14c6167b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 50644 4303c1255e6d4840b9ce34b8da158125
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 50662 5235fb30a8f35c91ea15335ee439a60d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 251576 5b89eeb214501b0a1b6e2d2712763fe3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 251558 573aa9cc9fba9924a98a1b6ca786edfe
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 28008514 baaf3f87d60cb1d68c361cea849d3c27
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb
+ Size/MD5 checksum: 28178022 c6cb8de82903383b78c7a9646d7df7da
+
+ Big endian MIPS architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 3346354 c0c5d438a80a114ffbe515104f44785f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 50644 822db9efc5caba5bd3f96c2ffef90ce8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 50692 9fbd9cb53ce75b25243adfb5568bd2f9
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 146348 4a2ede92f7cba5e409a01504a5787786
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 156600 b56c8fe624757cca08eafda9a7b62122
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 160930 14710075883c5cb17ed1f4dfa854461f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 179380 f61160dd2e459a70170e5ba8524aea36
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 179154 aba921bcc75c80c0c96c727eac34afaf
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 6090314 99e9641ce38b6d0530199ad566738d73
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 8271518 6979492cd1b01cf3b76958211bfb3bdf
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 9037182 56824fbbc825d14d2fec62b2562f44ce
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 15636546 85bc62cca019e5d5c07374fe4ea05df8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb
+ Size/MD5 checksum: 15608670 233369e78b74fdca2143c971995440f5
+
+ Little endian MIPS architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 3346628 a208480b2fa7bdd13559b4078d03cac9
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 50648 20d1bf2c345a889720562597f9300152
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 50712 31666ed837cac8aec136528616a7407f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 146012 ec774ccba8d1783239b0f12cee90abe3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 152252 99657c9b655c5f1bded07e4a5394d132
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 152340 0c0778fa59bda664f8cb4f0f1ba8f90b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 174444 8927ed0b8d880d99fcc79c64ecc44c54
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 179284 8b01ba01c4d2e0e4a1dbfd4acd5354ea
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 179144 368da689abd47ca70aced24efec5b040
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 6025698 a355ec38f440f7e08d0f22ce6184bcf8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 5937952 2de36f1fdeb55373eb50fb77efe7f938
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 5921402 006d6d3d34f2db5b21500cdc8914dc08
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 9857018 4246c3b15aae0df84b669381a8f1383e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 15052960 317130eff4221493bf31349bb99d0eab
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb
+ Size/MD5 checksum: 15019204 a5c6e183ff53d3c8fd169f0d2bc17ebc
+
+ PowerPC architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 3388916 6d6415c4241ea26786fd3a72899e266f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 50652 f19e0ad61b5e91f685e920a58248c8e9
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 50698 111c11da4f26a93122b76b6eac5b92c8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 248366 7bafbd435e00ad6b647b347d84e1e0c1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 225218 90e19db35ef618a7e3f476576de60d95
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 248400 3dd8373a35220a27423c3f4eadd32358
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 248712 8a0281e9b856372f4d01c8a0f4b02d72
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 242934 92f3fda2938f60fdf6f957f0659712ab
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 3411216 b9070329bf0a6045896db2fc15f66f0a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 248448 e108e05b4fe2239d4e95fb6598405fd6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 249006 3908dfaf4f518192bd550ca5ac45476f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 16623606 b76fa67819092073c6bfc51904163278
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 15149270 502237df8e0f90e7ab95b28cbe7a5f8f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 16960668 69f13fe8bde671497363849f76636eda
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 18291108 9cc68d73b1bcf401176d1f93bd1dfeb1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 16395670 fbab6e355aba9c29f63603d097855c5e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 17006732 cca0573ca442e02ad6f153fcc059f734
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+ Size/MD5 checksum: 18340518 3940b166f8b0464baa118c8557922edb
+
+ IBM S/390 architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 2939624 fada85c4d5ec9cbdee803116fde561b1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 50642 9478b247c93b2ba8b405f93b525307ae
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 50664 d694fdeff900e5b1ba575ad15bbd5310
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 139294 02bcbe57d1b62129243c8cb4b7bb8d2d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 139538 69993d0e2867ed4efa5bb0e442d3d014
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 2962698 36d89e72ac15117d15a3488878d205a4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 140274 5b8bacca256347a7ce02783651110e35
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 5398576 b1054f70f0472fd020241b6af904438d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 1435060 daf41750946017171aad603b9218d0c4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 5613112 68d67210c4c6aa0ea54b1754df137d8e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+ Size/MD5 checksum: 5659570 c6a2db3553a427cecf69d9f1258e9444
+
+ Sun Sparc architecture:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 3164578 902a8ff3089225278575251ba13f1f98
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 50640 455bd9863c6f183ee28d15e7ba9ddc38
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 50674 8416d5c20659923183729457854e139f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 161886 f58a554b0de7e05c4727bff1e236a069
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 191010 bad7bf07af89b1ba54ff559f99cf3d1b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 191776 f059b7c75ea312f69758d02e6da4cd4f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 3186936 2a865cc6aed95cdc0ed3ebb20ec0a6d0
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 192172 197b2cd91975cbda876bc0ac18244870
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 6406184 e0ce977a5c79906c4996f069672e272b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 10351700 69bc68d296d9134f6df792fb745c9810
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 10610496 b40bc9a07de220a54a1489b22d1d60f4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+ Size/MD5 checksum: 10656362 91c6c66c24c7d5ca45c0e6eb5dcdcbba
+
+ These files will probably be moved into the stable distribution on
+ its next update.
+
+---------------------------------------------------------------------------------
+For apt-get: deb http://security.debian.org/ etch/updates main
+For dpkg-ftp: ftp://security.debian.org/debian-security dists/etch/updates/main
+Mailing list: debian-security-announce@lists.debian.org
+Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

© 2014-2024 Faster IT GmbH | imprint | privacy policy