From 92c0c5e8d2cb87b51786ad82a0c92184709cfd73 Mon Sep 17 00:00:00 2001 From: dann frazier Date: Thu, 19 Mar 2009 20:38:16 +0000 Subject: new text git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1312 e094ebfe-e918-0410-adfb-c712417f3574 --- dsa-texts/2.6.26-13lenny2 | 522 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 522 insertions(+) create mode 100644 dsa-texts/2.6.26-13lenny2 (limited to 'dsa-texts/2.6.26-13lenny2') diff --git a/dsa-texts/2.6.26-13lenny2 b/dsa-texts/2.6.26-13lenny2 new file mode 100644 index 000000000..6a8eb3fe4 --- /dev/null +++ b/dsa-texts/2.6.26-13lenny2 @@ -0,0 +1,522 @@ +---------------------------------------------------------------------- +Debian Security Advisory DSA-XXXX-1 security@debian.org +http://www.debian.org/security/ dann frazier +March XX, 2009 http://www.debian.org/security/faq +---------------------------------------------------------------------- + +Package : linux-2.6 +Vulnerability : denial of service/privilege escalation/sensitive memory leak +Problem type : local/remote +Debian-specific: no +CVE Id(s) : CVE-2009-0029 CVE-2009-0031 CVE-2009-0065 CVE-2009-0269 + CVE-2009-0322 CVE-2009-0676 CVE-2009-0675 CVE-2009-0745 + CVE-2009-0746 CVE-2009-0747 CVE-2009-0748 + +Several vulnerabilities have been discovered in the Linux kernel that +may lead to a denial of service or privilege escalation. The Common +Vulnerabilities and Exposures project identifies the following +problems: + +CVE-2009-0029 + + Christian Borntraeger discovered an issue effecting the alpha, mips, + powerpc, s390 and sparc64 architectures that allows local users to + cause a denial of service or potentially gain elevated privileges. + +CVE-2009-0031 + + Vegard Nossum discovered a memory leak in the keyctl subsystem that + allows local users to cause a denial of service by consuming all of + kernel memory. + +CVE-2009-0065 + + Wei Yongjun discovered a memory overflow in the SCTP implementation + that can be triggered by remote users. + +CVE-2009-0269 + + Duane Griffin provided a fix for an issue in the eCryptfs subsystem + which allows local users to cause a denial of service (fault or + memory corruption). + +CVE-2009-0322 + + Pavel Roskin provided a fix for an issue in the dell_rbu driver that + allows a local user to cause a denial of service (oops) by reading 0 + byts from a sysfs entry. + +CVE-2009-0676 + + Clément LECIGNE discovered a bug in the sock_getsockopt function + that may result in a leak sensitive kernel memory. + +CVE-2009-0675 + + Roel Kluin discovered inverted logic in the skfddi driver that + permits local, unprivileged users to reset the driver statistics. + +CVE-2009-0745 + + Peter Kerwien discovered an issue in the ext4 filesystem that allows + local users to cause a denial of service (kernel oops) during a resize + operation. + +CVE-2009-0746 + + Sami Liedes reported an issue in the ext4 filesystem that allows + local users to cause a denial of service (kernel oops) when accessing + a specially crafted corrupt filesystem. + +CVE-2009-0747 + + David Maciejak reported an issue in the ext4 filesystem that allows + local users to cause a denial of service (kernel oops) when mounting + a specially crafted corrupt filesystem. + +CVE-2009-0748 + + David Maciejak reported an additional issue in the ext4 filesystem that + allows local users to cause a denial of service (kernel oops) when + mounting a specially crafted corrupt filesystem. + +For the stable distribution (lenny), these problems have been fixed +in version 2.6.26-13lenny2. + +For the oldstable distribution (etch), these problems will be fixed +in a future update. + +We recommend that you upgrade your linux-2.6, fai-kernels, and +user-mode-linux packages. + + +Upgrade instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +The following matrix lists additional source packages that were rebuilt for +compatability with or to take advantage of this update: + + Debian 4.0 (etch) + fai-kernels 1.17+etch.23etch1 + user-mode-linux 2.6.18-1um-2etch.23etch1 + +You may use an automated update by adding the resources from the +footer to the proper configuration. + +Debian GNU/Linux 4.0 alias etch +------------------------------- + +Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. + +Source archives: + + http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.23etch1.diff.gz + Size/MD5 checksum: 19360 f0384a843ffc8952cbff2e25fe627a6b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-23etch1.diff.gz + Size/MD5 checksum: 5413401 4a10af0cabdc8530b9c0d72891db9a42 + http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz + Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz + Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060 + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1.tar.gz + Size/MD5 checksum: 57771 c453400f733526582aa19eec52109711 + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1.dsc + Size/MD5 checksum: 740 f36c4fb705e5b9c7d698421d0aacf047 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-23etch1.dsc + Size/MD5 checksum: 5672 8293966d44f0bf254e9f9f5ed1630542 + http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.23etch1.dsc + Size/MD5 checksum: 892 c7b86a1845bc273e6a7f0471e0555e58 + +Architecture independent packages: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-23etch1_all.deb + Size/MD5 checksum: 1682698 9a53cd9991cfb454d638dbad8cea00b3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-23etch1_all.deb + Size/MD5 checksum: 41465432 23de1cd9c2a0fbb63065f924e5a9d00f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-23etch1_all.deb + Size/MD5 checksum: 3591554 d533d238b7e6864a72d0161a26ebb31a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-23etch1_all.deb + Size/MD5 checksum: 56918 822b3798ded87ac2b2729e55d410084e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-23etch1_all.deb + Size/MD5 checksum: 1090466 1f40c0abee8e501ef9ec411045f542f5 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-23etch1_all.deb + Size/MD5 checksum: 3720252 97794d565ab5db3db6cba485c2af80f0 + +alpha architecture (DEC Alpha) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 269882 c508165b7055b5193accbb4cdc037671 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 23468062 084f93a39246bf56e459ce5c831e0f36 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 270122 e14bc28b97a2ef24f619b5e16d72f175 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 270508 c85a852e5eaddd497fa52df9f54c426f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 23540558 a415d6aa887683a04706d9a6274549ed + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 56324 ffaae9d352af3b89e8166e2751ff3e47 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 56358 913ae5005ebdf8f65944e0f86d5f5242 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 3030252 2d943108a84cc4a642465732859ee59d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 269298 0e763ecd42cc9c8dca46a4abc14754ce + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 3055080 07159b547402fc8e14b8a02e0310a1c3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 23846502 aebc7b1a914bae3eec6c5ce06eae800a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23etch1_alpha.deb + Size/MD5 checksum: 23488466 177f9079cdaa79bb409b8f79ad91db2f + +amd64 architecture (AMD x86_64 (AMD64)) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 3170560 255cf26cc9f2a0caa6ce02fda46d7070 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 15263274 af1df9c75bc768c64ce052962d81b8e7 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 56316 13388b32d4f08245e24a3055ad369d6a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 274084 1446f3f108c3ef6f710e1c83bdc7794c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 16865488 e74a4409424bc37afd3cf8d84e7a88ef + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 273434 88baa6c7c91768f11cf7356963f0bb21 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 3359676 1fe292880b5f92a74e6bca61695082f3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 56338 a5bcb5abdc16f269afeb96d50f725136 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 15276526 f2eec94a9296818d23e1e970abc78d37 + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1_amd64.deb + Size/MD5 checksum: 5965696 94d7fd7aa223d2f54bcb64cbf553b299 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 3193726 368d1927a908710ac8a243776e32c3d5 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 3336820 46a4ddc2261240174c15cc854ed4ff08 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 1654746 c4a5b2789d28ab76a9bedebf0a8916c8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 16821542 978c7d8f1be5b7489a9e566cfc91acc1 + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 56294 3fa8984302102d25341ed91540c6ed1f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 1687270 8da6624be3045a0a6893d6038db454e3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 273164 985a1e8e8719d786b32db0162f999b2f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 273524 f00fff5b0c7480e6e16a32d9ccaa2c03 + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb + Size/MD5 checksum: 56306 93073a5b9a30ea081f0e9c12c6488d62 + +arm architecture (ARM) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 8874552 a280220d21fc5f33397ceccb611b16d3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 236070 b8d951c3d18f5850af73db2d5afe93a6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 235742 5212f40bfeace58989418ae3d8eb6e85 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 201472 d25b41af0a2f65cd399c754855680087 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 4591646 e2480d80466cb9dd0f6a225d25c256a6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 5015244 e0db634e60cfd8182051d7fdc44b5961 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 7927900 94e7099950e3e48ec90a0a120ac48c3e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 3412788 0d97a5df1ef81a19bb749f7eff564450 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 56422 698a5a5e7869490e094876dee3ccb040 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 56370 92d68631cccf9193aa86be44565293b9 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 206500 5ac78126922a636b71ee93be06a8efc0 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 241160 b3ba90c2e590d5f2d35b2ec87f0583e4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-23etch1_arm.deb + Size/MD5 checksum: 7571386 858738aafc789736b85a240abb06d6d1 + +hppa architecture (HP PA RISC) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 11816650 3eb4a8a52b839f37522c13bf261c2baf + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 198896 a243bf6d1631e669536291524fd97ba8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 56350 c692a9c128d4fb72bdf62443208b9afc + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 11006106 0def26738a5c0a14e25159f54ef45c9e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 197558 bd829e318bf0ca91e73fae9591baa333 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 11410956 261b9a7e7b2404c6eacd2317b9e26973 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 56326 6dcc57928f2d3ce4fb73d0450e66ceaf + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 199820 1a553bcc50cf8010f555eec232d633fc + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 3024676 bf1f90dbddccc38ecdbabc350dbb080e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 198504 2b5266526f59cb83af41ea197cd14e3b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-23etch1_hppa.deb + Size/MD5 checksum: 10559544 bd90bbbc7d8a8c6906a51bbf49b3e139 + +i386 architecture (Intel ia32) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 3212506 2f2838b74c687f49092cba088aaa5025 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 285422 716cabff79e8d108409024beedd5c761 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 56364 23fefb20fc7cfb2969c70ec3dcbfd7fc + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 3236014 280e515e4d33b74171f18d90192f2781 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 289742 0291669c961118af2f8d392d83cc2009 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 14388800 1ef26929395c35dd69c68e7d7d539387 + http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.23etch1_i386.deb + Size/MD5 checksum: 25602042 8edf459235cf919e70db35db6e18a81c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16540456 b64fd698fbb01314bd39b32b410ae487 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 278156 d87fae685c6799e42afdfb33ca8efd42 + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1_i386.deb + Size/MD5 checksum: 5508624 94bb0b0b80f8036b518837d5ce029f2b + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 56376 fbc3b44752cc24d54018e7500b7caa9c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16601198 58ad14c5b7a86283125b9d73f98c40ce + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 1330892 02d869d6e62a29107871094dad2d2bfb + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 286882 017783780fc1c626df5e6a739713cd2c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 278354 41e31611644a950b6a7b13e21c8fcb14 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 3114734 cc9dc53c187d950a1d154a4f59cd54df + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 14399606 21d200751abc6f09ad0fe60d5c4655ec + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16929578 4cc1238df2386a76dcd12ce916965be5 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 287314 383667c0683ced9603f2a21be6105158 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16474612 6ffb3493ae7141c3af2b00e513bda9b2 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 56422 eaad4bcfac9784563526b3ef77c3bbfe + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 3228386 53af98a695ee7732f5b682f013e81c9d + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 56348 def2ca9b2ceafe1170c6091f170d201d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 285644 2494d714e732fe2ca909cd80e0d4fcc2 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16514302 bbeabc71068d2664535d4d3b7d166b44 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16642362 1d69f5a6471d29ff481ccccdece1d5a3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 286868 76a6bbbb7810bab391fecd078ea713a6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 16323394 ac86cb6986fc48439edf76d0e78c75c4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 276950 548444172100ee78f39b3cbddfb0bd73 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb + Size/MD5 checksum: 1302696 a9988c16e715718a4d4547edf77d8c63 + +ia64 architecture (Intel ia64) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 56320 22738127d1c9ce4acc5538d0014fef5d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 56342 ecb66f5138131a351ea46167feda50a4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 3084404 5c6c1b42bc958427686de001a8f1a995 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 28020804 40c13c914b51a21a1a24023798899a7b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 257864 475005498346a7d8b38a7c29509ccf4a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 28186348 8826f9beccdf15d89e6e93b453d512c1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-23etch1_ia64.deb + Size/MD5 checksum: 257820 0c8cc79934f006def209bb4a499c60ff + +mips architecture (MIPS (Big Endian)) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 6126884 792de360f86746a53710e5bd33b8f163 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 56368 9a395680eae076a224dad896da65691c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 189126 18b896582f9351dc09b6e0a70ef90831 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 170032 3458ed1dbcdc45653181b5c0fc7ecdb8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 156908 2ff3f8ac181d494d7cb4ef7222d7b07e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 165172 7a17550dcdfa31d22bf8965127c2339f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 15683930 4561323bdc5a9ad5c7c2a0ce0b6d5b76 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 3416968 6e47ae5cf9ac7bd360f619fcc3a75038 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 56422 e924dcd73b5c94cabf01955f7f9a69ce + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 9081586 6949edfa7335d4dc6b8758d40e4eafbd + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 8315142 bedc220176f07a4d49a012acf38884aa + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 189364 765a041b2c8374633fac10555019d991 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mips.deb + Size/MD5 checksum: 15657240 01b773f5cebd3bcb5e82a3538afd9a43 + +mipsel architecture (MIPS (Little Endian)) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 9865338 31f59099408adfc72436644f2f8d241f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 3352366 25617a98b59a5bfa023619f4299105af + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 185002 6e688580a5b5f19076b769ed6f3a04f8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 184774 0e0657d343cc00aba89ef941f260cb8d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 158046 200fe3fc8019dc123292003cdd13ffea + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 6035456 df357ca827f11be089babe11ea898b64 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 180620 20de98111af4bad6a471d96e0089e038 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 56322 8c8613342248a855676af7a9051719ea + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 5949466 ec4818d43fa0c812535d528642cd97f6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 158062 1fc66a76a56aea3b0acdad506c35afa4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 15031350 7c814fc2adb6872726c73ac8798ea855 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 5929984 00c1d88fb99faa66fe1a4f96bf2ce23b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 152628 fb85eaff880b8de07536a59b1717b7ff + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 15060882 f3930b91f4a1cf543478cf1642fd99fd + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-23etch1_mipsel.deb + Size/MD5 checksum: 56380 67c590353ceebbd73e78eb7274b419a8 + +powerpc architecture (PowerPC) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 254232 df3428d02b7caf4d8859ffa421d9fb47 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 3394788 bf95b7b549b0e5dff3c131f392f6df10 + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.23etch1_powerpc.deb + Size/MD5 checksum: 3370368 67c60e48f8171e261b681c88a5eb49c1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 18302236 b00e64cee1bd14e44416587727b3e4d8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 231830 db040067803ff3bb9a4677411a4cc25f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 18357864 dde6c4a10d645a9a0a531fdc1cd17669 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 255932 4fbc330e627c9912e97d59f96eafb4e8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 56372 9886fc5b03211e6c45c0f096a3a61f53 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 16632328 c1c43bb84800ed32d9eb38638dd23d5a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 15163882 fe0bc4a175982e11cce21bb1cb8ab8e7 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 17018420 77506217a84db6b8a788059b579a9c84 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 255024 30e5ea717182f1c0b6cac5bd441dccbb + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 255918 505c4c33c287dfdebeaa98698e97c9f3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 247514 f5b68002876185469625bf32d1e002be + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 16408190 97416532c92c57c0e33f97e19853020e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 56326 b058a9108e32625a78db5e411b750b6d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 255198 85fcc0cdb31720c9c0bdf6043c47c138 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 3417130 4aa20378bea17d7cd44d77155ff36674 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23etch1_powerpc.deb + Size/MD5 checksum: 16974946 b132327c709f7a2a0b69c1aa3dda9ca7 + +s390 architecture (IBM S/390) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 2968510 3d7773ed1afb8221e10da8e4b4eabdba + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 1442824 840860b7a601870db6921de4c42e238b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 145978 e495aa518a5281a63e1131887335a0f0 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 5406378 3b9556c4af25a6f611d087500ddaa6c2 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 146542 d94c8a951655f053eb92ee574b964f65 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 5624558 c9f8f23a2bbbc88c1d15be853cb1f3bb + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 56342 55d68538e40adb1b9e35493b2b74915e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 56318 832d1344921a7aba3dd12519427c5a6d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 5666984 b130f7034aec80a7bd91a4aad1bad5ab + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 2945466 a4efd6af72524aa0c66f5826b2ba64e0 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23etch1_s390.deb + Size/MD5 checksum: 147214 ad3a2622e0e6a8f2320a9a588ed69703 + +sparc architecture (Sun SPARC/UltraSPARC) + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 10742802 231ff49c22bbdbae0140dc9321cb38d2 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 201818 a8207a5a4c9fe0477e199f0e3122a9ba + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 203204 433d0d869346e23e8d8ac404dabc6f05 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 56402 d153a7923ae65aa917033593d37431e3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 6462310 5ecc441c0a37c7f36e08d6ae7555f797 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 10432952 a4b5abd32db9c00b8c675673da094c7a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 56370 8d7ecca445ea50ab719944b89f5bfeb9 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 202588 bbffae6906ea1411033d990001e7bd45 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 3247520 bb5b20226d4c291646997f750b8e1735 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 170142 43370064b577b685f34d0b9613ce140b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 10701158 a0233a7673dc3b128b49f97d3afd679b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_sparc.deb + Size/MD5 checksum: 3223030 0a1a542113a8a800d0afcd562f5679aa + + These changes will probably be included in the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ -- cgit v1.2.3