summaryrefslogtreecommitdiffstats
path: root/dsa-texts/2.6.26-13lenny2
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2009-03-19 20:38:16 +0000
committerdann frazier <dannf@debian.org>2009-03-19 20:38:16 +0000
commit92c0c5e8d2cb87b51786ad82a0c92184709cfd73 (patch)
tree9034dfac6f03048f07b1e580596e42f8be94e264 /dsa-texts/2.6.26-13lenny2
parentf2100e5c811bbc3bed3ba42dc9f87d05d438108e (diff)
new text
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1312 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.26-13lenny2')
-rw-r--r--dsa-texts/2.6.26-13lenny2522
1 files changed, 522 insertions, 0 deletions
diff --git a/dsa-texts/2.6.26-13lenny2 b/dsa-texts/2.6.26-13lenny2
new file mode 100644
index 00000000..6a8eb3fe
--- /dev/null
+++ b/dsa-texts/2.6.26-13lenny2
@@ -0,0 +1,522 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-XXXX-1 security@debian.org
+http://www.debian.org/security/ dann frazier
+March XX, 2009 http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package : linux-2.6
+Vulnerability : denial of service/privilege escalation/sensitive memory leak
+Problem type : local/remote
+Debian-specific: no
+CVE Id(s) : CVE-2009-0029 CVE-2009-0031 CVE-2009-0065 CVE-2009-0269
+ CVE-2009-0322 CVE-2009-0676 CVE-2009-0675 CVE-2009-0745
+ CVE-2009-0746 CVE-2009-0747 CVE-2009-0748
+
+Several vulnerabilities have been discovered in the Linux kernel that
+may lead to a denial of service or privilege escalation. The Common
+Vulnerabilities and Exposures project identifies the following
+problems:
+
+CVE-2009-0029
+
+ Christian Borntraeger discovered an issue effecting the alpha, mips,
+ powerpc, s390 and sparc64 architectures that allows local users to
+ cause a denial of service or potentially gain elevated privileges.
+
+CVE-2009-0031
+
+ Vegard Nossum discovered a memory leak in the keyctl subsystem that
+ allows local users to cause a denial of service by consuming all of
+ kernel memory.
+
+CVE-2009-0065
+
+ Wei Yongjun discovered a memory overflow in the SCTP implementation
+ that can be triggered by remote users.
+
+CVE-2009-0269
+
+ Duane Griffin provided a fix for an issue in the eCryptfs subsystem
+ which allows local users to cause a denial of service (fault or
+ memory corruption).
+
+CVE-2009-0322
+
+ Pavel Roskin provided a fix for an issue in the dell_rbu driver that
+ allows a local user to cause a denial of service (oops) by reading 0
+ byts from a sysfs entry.
+
+CVE-2009-0676
+
+ Clément LECIGNE discovered a bug in the sock_getsockopt function
+ that may result in a leak sensitive kernel memory.
+
+CVE-2009-0675
+
+ Roel Kluin discovered inverted logic in the skfddi driver that
+ permits local, unprivileged users to reset the driver statistics.
+
+CVE-2009-0745
+
+ Peter Kerwien discovered an issue in the ext4 filesystem that allows
+ local users to cause a denial of service (kernel oops) during a resize
+ operation.
+
+CVE-2009-0746
+
+ Sami Liedes reported an issue in the ext4 filesystem that allows
+ local users to cause a denial of service (kernel oops) when accessing
+ a specially crafted corrupt filesystem.
+
+CVE-2009-0747
+
+ David Maciejak reported an issue in the ext4 filesystem that allows
+ local users to cause a denial of service (kernel oops) when mounting
+ a specially crafted corrupt filesystem.
+
+CVE-2009-0748
+
+ David Maciejak reported an additional issue in the ext4 filesystem that
+ allows local users to cause a denial of service (kernel oops) when
+ mounting a specially crafted corrupt filesystem.
+
+For the stable distribution (lenny), these problems have been fixed
+in version 2.6.26-13lenny2.
+
+For the oldstable distribution (etch), these problems will be fixed
+in a future update.
+
+We recommend that you upgrade your linux-2.6, fai-kernels, and
+user-mode-linux packages.
+
+
+Upgrade instructions
+--------------------
+
+wget url
+ will fetch the file for you
+dpkg -i file.deb
+ will install the referenced file.
+
+If you are using the apt-get package manager, use the line for
+sources.list as given below:
+
+apt-get update
+ will update the internal database
+apt-get upgrade
+ will install corrected packages
+
+The following matrix lists additional source packages that were rebuilt for
+compatability with or to take advantage of this update:
+
+ Debian 4.0 (etch)
+ fai-kernels 1.17+etch.23etch1
+ user-mode-linux 2.6.18-1um-2etch.23etch1
+
+You may use an automated update by adding the resources from the
+footer to the proper configuration.
+
+Debian GNU/Linux 4.0 alias etch
+-------------------------------
+
+Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
+
+Source archives:
+
+ http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.23etch1.diff.gz
+ Size/MD5 checksum: 19360 f0384a843ffc8952cbff2e25fe627a6b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-23etch1.diff.gz
+ Size/MD5 checksum: 5413401 4a10af0cabdc8530b9c0d72891db9a42
+ http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz
+ Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
+ Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1.tar.gz
+ Size/MD5 checksum: 57771 c453400f733526582aa19eec52109711
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1.dsc
+ Size/MD5 checksum: 740 f36c4fb705e5b9c7d698421d0aacf047
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-23etch1.dsc
+ Size/MD5 checksum: 5672 8293966d44f0bf254e9f9f5ed1630542
+ http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.23etch1.dsc
+ Size/MD5 checksum: 892 c7b86a1845bc273e6a7f0471e0555e58
+
+Architecture independent packages:
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-23etch1_all.deb
+ Size/MD5 checksum: 1682698 9a53cd9991cfb454d638dbad8cea00b3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-23etch1_all.deb
+ Size/MD5 checksum: 41465432 23de1cd9c2a0fbb63065f924e5a9d00f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-23etch1_all.deb
+ Size/MD5 checksum: 3591554 d533d238b7e6864a72d0161a26ebb31a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-23etch1_all.deb
+ Size/MD5 checksum: 56918 822b3798ded87ac2b2729e55d410084e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-23etch1_all.deb
+ Size/MD5 checksum: 1090466 1f40c0abee8e501ef9ec411045f542f5
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-23etch1_all.deb
+ Size/MD5 checksum: 3720252 97794d565ab5db3db6cba485c2af80f0
+
+alpha architecture (DEC Alpha)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 269882 c508165b7055b5193accbb4cdc037671
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 23468062 084f93a39246bf56e459ce5c831e0f36
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 270122 e14bc28b97a2ef24f619b5e16d72f175
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 270508 c85a852e5eaddd497fa52df9f54c426f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 23540558 a415d6aa887683a04706d9a6274549ed
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 56324 ffaae9d352af3b89e8166e2751ff3e47
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 56358 913ae5005ebdf8f65944e0f86d5f5242
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 3030252 2d943108a84cc4a642465732859ee59d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 269298 0e763ecd42cc9c8dca46a4abc14754ce
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 3055080 07159b547402fc8e14b8a02e0310a1c3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 23846502 aebc7b1a914bae3eec6c5ce06eae800a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23etch1_alpha.deb
+ Size/MD5 checksum: 23488466 177f9079cdaa79bb409b8f79ad91db2f
+
+amd64 architecture (AMD x86_64 (AMD64))
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 3170560 255cf26cc9f2a0caa6ce02fda46d7070
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 15263274 af1df9c75bc768c64ce052962d81b8e7
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 56316 13388b32d4f08245e24a3055ad369d6a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 274084 1446f3f108c3ef6f710e1c83bdc7794c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 16865488 e74a4409424bc37afd3cf8d84e7a88ef
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 273434 88baa6c7c91768f11cf7356963f0bb21
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 3359676 1fe292880b5f92a74e6bca61695082f3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 56338 a5bcb5abdc16f269afeb96d50f725136
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 15276526 f2eec94a9296818d23e1e970abc78d37
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1_amd64.deb
+ Size/MD5 checksum: 5965696 94d7fd7aa223d2f54bcb64cbf553b299
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 3193726 368d1927a908710ac8a243776e32c3d5
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 3336820 46a4ddc2261240174c15cc854ed4ff08
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 1654746 c4a5b2789d28ab76a9bedebf0a8916c8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 16821542 978c7d8f1be5b7489a9e566cfc91acc1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 56294 3fa8984302102d25341ed91540c6ed1f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 1687270 8da6624be3045a0a6893d6038db454e3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 273164 985a1e8e8719d786b32db0162f999b2f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 273524 f00fff5b0c7480e6e16a32d9ccaa2c03
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb
+ Size/MD5 checksum: 56306 93073a5b9a30ea081f0e9c12c6488d62
+
+arm architecture (ARM)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 8874552 a280220d21fc5f33397ceccb611b16d3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 236070 b8d951c3d18f5850af73db2d5afe93a6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 235742 5212f40bfeace58989418ae3d8eb6e85
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 201472 d25b41af0a2f65cd399c754855680087
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 4591646 e2480d80466cb9dd0f6a225d25c256a6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 5015244 e0db634e60cfd8182051d7fdc44b5961
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 7927900 94e7099950e3e48ec90a0a120ac48c3e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 3412788 0d97a5df1ef81a19bb749f7eff564450
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 56422 698a5a5e7869490e094876dee3ccb040
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 56370 92d68631cccf9193aa86be44565293b9
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 206500 5ac78126922a636b71ee93be06a8efc0
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 241160 b3ba90c2e590d5f2d35b2ec87f0583e4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-23etch1_arm.deb
+ Size/MD5 checksum: 7571386 858738aafc789736b85a240abb06d6d1
+
+hppa architecture (HP PA RISC)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 11816650 3eb4a8a52b839f37522c13bf261c2baf
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 198896 a243bf6d1631e669536291524fd97ba8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 56350 c692a9c128d4fb72bdf62443208b9afc
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 11006106 0def26738a5c0a14e25159f54ef45c9e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 197558 bd829e318bf0ca91e73fae9591baa333
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 11410956 261b9a7e7b2404c6eacd2317b9e26973
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 56326 6dcc57928f2d3ce4fb73d0450e66ceaf
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 199820 1a553bcc50cf8010f555eec232d633fc
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 3024676 bf1f90dbddccc38ecdbabc350dbb080e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 198504 2b5266526f59cb83af41ea197cd14e3b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-23etch1_hppa.deb
+ Size/MD5 checksum: 10559544 bd90bbbc7d8a8c6906a51bbf49b3e139
+
+i386 architecture (Intel ia32)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 3212506 2f2838b74c687f49092cba088aaa5025
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 285422 716cabff79e8d108409024beedd5c761
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 56364 23fefb20fc7cfb2969c70ec3dcbfd7fc
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 3236014 280e515e4d33b74171f18d90192f2781
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 289742 0291669c961118af2f8d392d83cc2009
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 14388800 1ef26929395c35dd69c68e7d7d539387
+ http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.23etch1_i386.deb
+ Size/MD5 checksum: 25602042 8edf459235cf919e70db35db6e18a81c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16540456 b64fd698fbb01314bd39b32b410ae487
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 278156 d87fae685c6799e42afdfb33ca8efd42
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1_i386.deb
+ Size/MD5 checksum: 5508624 94bb0b0b80f8036b518837d5ce029f2b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 56376 fbc3b44752cc24d54018e7500b7caa9c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16601198 58ad14c5b7a86283125b9d73f98c40ce
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 1330892 02d869d6e62a29107871094dad2d2bfb
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 286882 017783780fc1c626df5e6a739713cd2c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 278354 41e31611644a950b6a7b13e21c8fcb14
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 3114734 cc9dc53c187d950a1d154a4f59cd54df
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 14399606 21d200751abc6f09ad0fe60d5c4655ec
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16929578 4cc1238df2386a76dcd12ce916965be5
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 287314 383667c0683ced9603f2a21be6105158
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16474612 6ffb3493ae7141c3af2b00e513bda9b2
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 56422 eaad4bcfac9784563526b3ef77c3bbfe
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 3228386 53af98a695ee7732f5b682f013e81c9d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 56348 def2ca9b2ceafe1170c6091f170d201d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 285644 2494d714e732fe2ca909cd80e0d4fcc2
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16514302 bbeabc71068d2664535d4d3b7d166b44
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16642362 1d69f5a6471d29ff481ccccdece1d5a3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 286868 76a6bbbb7810bab391fecd078ea713a6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 16323394 ac86cb6986fc48439edf76d0e78c75c4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 276950 548444172100ee78f39b3cbddfb0bd73
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb
+ Size/MD5 checksum: 1302696 a9988c16e715718a4d4547edf77d8c63
+
+ia64 architecture (Intel ia64)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 56320 22738127d1c9ce4acc5538d0014fef5d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 56342 ecb66f5138131a351ea46167feda50a4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 3084404 5c6c1b42bc958427686de001a8f1a995
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 28020804 40c13c914b51a21a1a24023798899a7b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 257864 475005498346a7d8b38a7c29509ccf4a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 28186348 8826f9beccdf15d89e6e93b453d512c1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-23etch1_ia64.deb
+ Size/MD5 checksum: 257820 0c8cc79934f006def209bb4a499c60ff
+
+mips architecture (MIPS (Big Endian))
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 6126884 792de360f86746a53710e5bd33b8f163
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 56368 9a395680eae076a224dad896da65691c
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 189126 18b896582f9351dc09b6e0a70ef90831
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 170032 3458ed1dbcdc45653181b5c0fc7ecdb8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 156908 2ff3f8ac181d494d7cb4ef7222d7b07e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 165172 7a17550dcdfa31d22bf8965127c2339f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 15683930 4561323bdc5a9ad5c7c2a0ce0b6d5b76
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 3416968 6e47ae5cf9ac7bd360f619fcc3a75038
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 56422 e924dcd73b5c94cabf01955f7f9a69ce
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 9081586 6949edfa7335d4dc6b8758d40e4eafbd
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 8315142 bedc220176f07a4d49a012acf38884aa
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 189364 765a041b2c8374633fac10555019d991
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mips.deb
+ Size/MD5 checksum: 15657240 01b773f5cebd3bcb5e82a3538afd9a43
+
+mipsel architecture (MIPS (Little Endian))
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 9865338 31f59099408adfc72436644f2f8d241f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 3352366 25617a98b59a5bfa023619f4299105af
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 185002 6e688580a5b5f19076b769ed6f3a04f8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 184774 0e0657d343cc00aba89ef941f260cb8d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 158046 200fe3fc8019dc123292003cdd13ffea
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 6035456 df357ca827f11be089babe11ea898b64
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 180620 20de98111af4bad6a471d96e0089e038
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 56322 8c8613342248a855676af7a9051719ea
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 5949466 ec4818d43fa0c812535d528642cd97f6
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 158062 1fc66a76a56aea3b0acdad506c35afa4
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 15031350 7c814fc2adb6872726c73ac8798ea855
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 5929984 00c1d88fb99faa66fe1a4f96bf2ce23b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 152628 fb85eaff880b8de07536a59b1717b7ff
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 15060882 f3930b91f4a1cf543478cf1642fd99fd
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-23etch1_mipsel.deb
+ Size/MD5 checksum: 56380 67c590353ceebbd73e78eb7274b419a8
+
+powerpc architecture (PowerPC)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 254232 df3428d02b7caf4d8859ffa421d9fb47
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 3394788 bf95b7b549b0e5dff3c131f392f6df10
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1_powerpc.deb
+ Size/MD5 checksum: 3370368 67c60e48f8171e261b681c88a5eb49c1
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 18302236 b00e64cee1bd14e44416587727b3e4d8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 231830 db040067803ff3bb9a4677411a4cc25f
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 18357864 dde6c4a10d645a9a0a531fdc1cd17669
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 255932 4fbc330e627c9912e97d59f96eafb4e8
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 56372 9886fc5b03211e6c45c0f096a3a61f53
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 16632328 c1c43bb84800ed32d9eb38638dd23d5a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 15163882 fe0bc4a175982e11cce21bb1cb8ab8e7
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 17018420 77506217a84db6b8a788059b579a9c84
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 255024 30e5ea717182f1c0b6cac5bd441dccbb
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 255918 505c4c33c287dfdebeaa98698e97c9f3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 247514 f5b68002876185469625bf32d1e002be
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 16408190 97416532c92c57c0e33f97e19853020e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 56326 b058a9108e32625a78db5e411b750b6d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 255198 85fcc0cdb31720c9c0bdf6043c47c138
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 3417130 4aa20378bea17d7cd44d77155ff36674
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23etch1_powerpc.deb
+ Size/MD5 checksum: 16974946 b132327c709f7a2a0b69c1aa3dda9ca7
+
+s390 architecture (IBM S/390)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 2968510 3d7773ed1afb8221e10da8e4b4eabdba
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 1442824 840860b7a601870db6921de4c42e238b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 145978 e495aa518a5281a63e1131887335a0f0
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 5406378 3b9556c4af25a6f611d087500ddaa6c2
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 146542 d94c8a951655f053eb92ee574b964f65
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 5624558 c9f8f23a2bbbc88c1d15be853cb1f3bb
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 56342 55d68538e40adb1b9e35493b2b74915e
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 56318 832d1344921a7aba3dd12519427c5a6d
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 5666984 b130f7034aec80a7bd91a4aad1bad5ab
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 2945466 a4efd6af72524aa0c66f5826b2ba64e0
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23etch1_s390.deb
+ Size/MD5 checksum: 147214 ad3a2622e0e6a8f2320a9a588ed69703
+
+sparc architecture (Sun SPARC/UltraSPARC)
+
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 10742802 231ff49c22bbdbae0140dc9321cb38d2
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 201818 a8207a5a4c9fe0477e199f0e3122a9ba
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 203204 433d0d869346e23e8d8ac404dabc6f05
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 56402 d153a7923ae65aa917033593d37431e3
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 6462310 5ecc441c0a37c7f36e08d6ae7555f797
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 10432952 a4b5abd32db9c00b8c675673da094c7a
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 56370 8d7ecca445ea50ab719944b89f5bfeb9
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 202588 bbffae6906ea1411033d990001e7bd45
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 3247520 bb5b20226d4c291646997f750b8e1735
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 170142 43370064b577b685f34d0b9613ce140b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 10701158 a0233a7673dc3b128b49f97d3afd679b
+ http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_sparc.deb
+ Size/MD5 checksum: 3223030 0a1a542113a8a800d0afcd562f5679aa
+
+ These changes will probably be included in the stable distribution on
+ its next update.
+
+---------------------------------------------------------------------------------
+For apt-get: deb http://security.debian.org/ stable/updates main
+For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
+Mailing list: debian-security-announce@lists.debian.org
+Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

© 2014-2024 Faster IT GmbH | imprint | privacy policy