From jmm@debian.org Wed Apr 5 03:45:25 2006 From: Moritz Muehlenhoff Resent-From: list@murphy.debian.org (Mailing List Manager) To: debian-security-announce@lists.debian.org Date: Wed, 5 Apr 2006 09:45:22 +0200 Reply-To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] [SECURITY] [DSA 1018-2] New Linux kernel 2.4.27 packages fix several vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1018-2 security@debian.org http://www.debian.org/security/ Dann Frazier, Simon Horman April 5th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : kernel-source-2.4.27 Vulnerability : several Problem-Type : local/remote Debian-specific: no CVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618 The original update lacked recompiled ALSA modules against the new kernel ABI. Furthermore, kernel-latest-2.4-sparc now correctly depends on the updated packages. For completeness we're providing the original problem description: Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-0887 Martin Schwidefsky discovered that the privileged instruction SACF (Set Address Space Control Fast) on the S/390 platform is not handled properly, allowing for a local user to gain root privileges. CVE-2004-1058 A race condition allows for a local user to read the environment variables of another process that is still spawning through /proc/.../cmdline. CVE-2004-2607 A numeric casting discrepancy in sdla_xfer allows local users to read portions of kernel memory via a large len argument which is received as an int but cast to a short, preventing read loop from filling a buffer. CVE-2005-0449 An error in the skb_checksum_help() function from the netfilter framework has been discovered that allows the bypass of packet filter rules or a denial of service attack. CVE-2005-1761 A vulnerability in the ptrace subsystem of the IA-64 architecture can allow local attackers to overwrite kernel memory and crash the kernel. CVE-2005-2457 Tim Yamin discovered that insufficient input validation in the compressed ISO file system (zisofs) allows a denial of service attack through maliciously crafted ISO images. CVE-2005-2555 Herbert Xu discovered that the setsockopt() function was not restricted to users/processes with the CAP_NET_ADMIN capability. This allows attackers to manipulate IPSEC policies or initiate a denial of service attack. CVE-2005-2709 Al Viro discovered a race condition in the /proc handling of network devices. A (local) attacker could exploit the stale reference after interface shutdown to cause a denial of service or possibly execute code in kernel mode. CVE-2005-2973 Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code can be forced into an endless loop, which allows a denial of service attack. CVE-2005-3257 Rudolf Polzer discovered that the kernel improperly restricts access to the KDSKBSENT ioctl, which can possibly lead to privilege escalation. CVE-2005-3783 The ptrace code using CLONE_THREAD didn't use the thread group ID to determine whether the caller is attaching to itself, which allows a denial of service attack. CVE-2005-3806 Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable, which could lead to memory corruption and denial of service. CVE-2005-3848 Ollie Wild discovered a memory leak in the icmp_push_reply() function, which allows denial of service through memory consumption. CVE-2005-3857 Chris Wright discovered that excessive allocation of broken file lock leases in the VFS layer can exhaust memory and fill up the system logging, which allows denial of service. CVE-2005-3858 Patrick McHardy discovered a memory leak in the ip6_input_finish() function from the IPv6 code, which allows denial of service. CVE-2005-4618 Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which allows a denial of service attack. The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.4.27-10sarge2 Alpha architecture 2.4.27-10sarge2 ARM architecture 2.4.27-2sarge2 Intel IA-32 architecture 2.4.27-10sarge2 Intel IA-64 architecture 2.4.27-10sarge2 Motorola 680x0 architecture 2.4.27-3sarge2 Big endian MIPS architecture 2.4.27-10.sarge1.040815-2 Little endian MIPS architecture 2.4.27-10.sarge1.040815-2 PowerPC architecture 2.4.27-10sarge2 IBM S/390 architecture 2.4.27-2sarge2 Sun Sparc architecture 2.4.27-9sarge2 The following matrix lists additional packages that were rebuilt for compatability with or to take advantage of this update: Debian 3.1 (sarge) kernel-latest-2.4-alpha 101sarge1 kernel-latest-2.4-i386 101sarge1 kernel-latest-2.4-s390 2.4.27-1sarge1 kernel-latest-2.4-sparc 42sarge2 kernel-latest-powerpc 102sarge1 fai-kernels 1.9.1sarge1 i2c 1:2.9.1-1sarge1 kernel-image-speakup-i386 2.4.27-1.1sasrge1 lm-sensors 1:2.9.1-1sarge3 mindi-kernel 2.4.27-2sarge1 pcmcia-modules-2.4.27-i386 3.2.5+2sarge1 systemimager 3.2.3-6sarge1 alsa-modules-i386 1.0.8+2sarge1 We recommend that you upgrade your kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes. This update introduces a change in the kernel's binary interface, the affected kernel packages inside Debian have been rebuilt, if you're running local addons you'll need to rebuild these as well. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get dist-upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.diff.gz Size/MD5 checksum: 713256 04938bd9582171f13459f40245fdb402 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.dsc Size/MD5 checksum: 685 8d2419804b5d12e4602271c26dcad450 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.dsc Size/MD5 checksum: 1089 13968c7c9bb075bad3b2cb95feef384c http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.dsc Size/MD5 checksum: 1129 4396133a6b96b9dbceb66d2a48852d88 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.diff.gz Size/MD5 checksum: 32931 119d0d836ed566e15624f809701d0ab9 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.dsc Size/MD5 checksum: 1345 1a4ebdb73d7bd94d2b0d51b75f5451cc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.tar.gz Size/MD5 checksum: 30119 0df45f3ce9d32988eed0d9567cf0b4fa http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.tar.gz Size/MD5 checksum: 53307 d8a5d2061c0790cfd9467864502818e3 http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz Size/MD5 checksum: 101556 397541e2aa7fc958a4852dffa6c8d1fb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.dsc Size/MD5 checksum: 1074 ba4f46144c5db2a3c76358689fdb0185 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.tar.gz Size/MD5 checksum: 32208 71392893f2e012ffafaab2bb43f8e488 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.dsc Size/MD5 checksum: 831 687b8a0516c44a1527a90f5df5c772ab http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.tar.gz Size/MD5 checksum: 15975115 9fd8b15f9f92314ea9cea3f22a77ec5b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.dsc Size/MD5 checksum: 839 878a7971258f25a1c17fdb6362e9909f http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.dsc Size/MD5 checksum: 900 efe323453f0dc718c6d9490ca3ca691e http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.tar.gz Size/MD5 checksum: 2617 cf7e82afaef00b0cf93521fdccf4ed5c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.tar.gz Size/MD5 checksum: 9841 53b6e1fe5e9060c93ef9ff91cedf490f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.dsc Size/MD5 checksum: 1143 9cc5658049d0158385bc82424ab75361 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz Size/MD5 checksum: 1597 fcbb9bc6a69ad10f0712ea03cad557ef http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.tar.gz Size/MD5 checksum: 1950 c4a4fbe2095a7d43cf6b33cc9c73f372 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.diff.gz Size/MD5 checksum: 2786 a0a40636362e7f5c03ffae5fca94edbd http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.tar.gz Size/MD5 checksum: 1462678 eab044878df015bbf85329c2498ed8e8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.tar.gz Size/MD5 checksum: 20216 0ae4467cf28f4a513e68c2d6ba413d9b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.tar.gz Size/MD5 checksum: 97376 1a3af863ee67797a398cc33c1b3fcf3c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.dsc Size/MD5 checksum: 1581 53d1f65a236f842d634d2f472d761792 http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.dsc Size/MD5 checksum: 857 6c617b10e65d623d40a8c5d6d89107f9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.tar.gz Size/MD5 checksum: 8212 0598b1ff05e1d4dd4c434a39c9f018a6 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.dsc Size/MD5 checksum: 750 4d8bed84c0e377a458977c40ef253a64 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709 http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.dsc Size/MD5 checksum: 1012 0fcee4cf17e43873f37e6920aa11dd1c http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.dsc Size/MD5 checksum: 732 99407eb60a651fe0d937fc9ce0942885 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.dsc Size/MD5 checksum: 875 9af3fd80b96a54759a11563dc735f349 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.dsc Size/MD5 checksum: 831 fb35a83abc577050eefca213f1c1e5ef http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc Size/MD5 checksum: 825 5ddcf45bf8e95a7f1004e6ad97d9502e http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.tar.gz Size/MD5 checksum: 307908 19a86536a0b624c16cb95e6277510eeb http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc Size/MD5 checksum: 663 32e3700237d6c8399991db0cb219ca2b http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.tar.gz Size/MD5 checksum: 16651 4681c5a0ef28cf92bc861a477859f424 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.dsc Size/MD5 checksum: 1051 1063b480da66a98327389106a60fd1de http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.diff.gz Size/MD5 checksum: 9623 3900d3b14fc77579eb661dac9d7becdb http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.dsc Size/MD5 checksum: 848 54a0059bc7215f82dd95c64e729b0dd4 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.tar.gz Size/MD5 checksum: 2243 7dd011636f037d3e004e202cdcef99dd Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge2_all.deb Size/MD5 checksum: 671384 656244ac0eeb0edfd0eec5cf80526303 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge3_all.deb Size/MD5 checksum: 945646 e1bc68ea39ee276dfb3a24318c8aa765 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge1_all.deb Size/MD5 checksum: 2418378 cebb78cbbb3762c243f99b86884cc5ac http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge1_all.deb Size/MD5 checksum: 9542922 f8049a1e8cee07d0e2a1fdc7357e252a http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge1_all.deb Size/MD5 checksum: 4758102 b469e5a3b6bc93a459274310199899a7 http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge1_all.deb Size/MD5 checksum: 159912 1c1283ab19292c86be4fa765840eff13 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge2_all.deb Size/MD5 checksum: 3578772 5b413310b3826dec3f0113e1215ca51f http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge2_all.deb Size/MD5 checksum: 25710 12d938fd6fe17432924452f0f8ae039f http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge1_all.deb Size/MD5 checksum: 29630 81379a2aae787fcb85eb937cffb8e62e http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge1_all.deb Size/MD5 checksum: 630106 3557f0934650e872d93b88b5150f9815 http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb Size/MD5 checksum: 106132 81b855594bb23ab228c447f2f5343c8e http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge1_all.deb Size/MD5 checksum: 115340 5e1b98b83d853a2a0c24695ff1c82251 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2_all.deb Size/MD5 checksum: 31030888 b556d3b35835290ef34e01c23b0dfb7b http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge1_all.deb Size/MD5 checksum: 29366 b65b98e266e64ff2a5cdd74558a0a922 http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge1_all.deb Size/MD5 checksum: 14680 d45c6cd85a3bb2d3388d9bbe6cc422e5 http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb Size/MD5 checksum: 304520 cad3f6be07e47fc9163882225608a2c5 Alpha architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge2_alpha.deb Size/MD5 checksum: 4572390 9d8b171c601c6aa551bcb9a2be6862f1 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb Size/MD5 checksum: 1986 bda45dedcf2b5ed4f6b8d030f18e11b6 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb Size/MD5 checksum: 1982 7ee85d7e5e2753a2b379de867c127c78 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb Size/MD5 checksum: 16518544 b49f831395ee62bde73f0aad25ddd438 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb Size/MD5 checksum: 16968168 db461b6d5cfb842ead1420c0edb61f99 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb Size/MD5 checksum: 270900 5e321af02b9c205f38bbc4be49fbc9a8 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb Size/MD5 checksum: 1980 475f0b3c517d16740be06abbc4e3d4a9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge2_alpha.deb Size/MD5 checksum: 5732 43ca0eeaab913f6faef8eb5a2f432741 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb Size/MD5 checksum: 272828 9c7e1914da800e5e98fd6336c9ad6060 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb Size/MD5 checksum: 1980 6da3aab7853283f763332efde9619e7c ARM architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 4657792 6efae5dc812abfc779c02c402df0fd3d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 3142828 79bb6bed414464dfb134ca5be8eb0d9a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 3665410 a91d34d5ddf87dfb43d2fa1252679d70 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 7330418 38c4e7edaf85174e42c1a0272cd71090 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 1054774 e098137f0ef0d731443810ee9eaed718 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 463856 eaa7abc8f41e6e10ca123b8c27f348a9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge2_arm.deb Size/MD5 checksum: 1689532 d636ec6606fd50d41fc4f6f5e5d5e103 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb Size/MD5 checksum: 11302740 d57ff9246788c39d98903f7b3270fabd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 1823622 2acb45e3fed2a4d7f2e952a258864081 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 12338568 be29794a003a05edc00e3a03d34b3eea http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb Size/MD5 checksum: 2286 4b863896be1e22d0c1005131b8f9bfec http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 258984 f0ca8379fd4fe3e7bd07480630d01b05 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge1_i386.deb Size/MD5 checksum: 2158 b17c62827446c35c0e8f787a262aa180 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 298250 836b9106a35174e7232c018cd2d2c71a http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 477580 24ef30a122508783dc22e87a43923e45 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 11049922 6548a659a11435f1b6ebcefd850c7b69 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 299950 27e5ee810fc890b649ad25cc2edff073 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb Size/MD5 checksum: 2168 1b80507c432362c471b60ee18b47d0b4 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 258980 cf019b62e65a17b0ed20e149faa44559 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 267748 9555f73de465bd2114d0caf2a41acff2 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 259572 9505af261ada93ee26c66a3fb0d7d82e http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb Size/MD5 checksum: 2164 ac150587b9d3f22de309ea312f11c321 http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 484192 c46d1f7e98b6b3e625158ddaca907951 http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 477610 61f0e8d1bd3dcbf8447a15f3986710ce http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 477644 302afa94885da8c4f143b8f5aa3476b0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 292198 ff62442bd8a017f09636faa7087eaf08 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge1_i386.deb Size/MD5 checksum: 2176 8f3ad5ed0dc40fc3d9427412798905ca http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 298386 aae34ecc6770f907d0b7de0e7203fac6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 297322 bd2931acac7b7e82b240031b76dbb2a0 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge1_i386.deb Size/MD5 checksum: 2214 b0da0d519fee471f1445bcec8e1072c3 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 12025684 071b3edb763ba490c0101452d467c8a1 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1_i386.deb Size/MD5 checksum: 7765638 f8e51efba0f3cb10b658e01e12c6b9bb http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77860 2412ecaf415f28cedf1594fc5853a59d http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 258984 1e42dac94e18a442204e159252730d5e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 297106 adfdcbda85639abcd9d387baa6779ef1 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb Size/MD5 checksum: 2250 c1d2ec30560223773db6fb3fb5f68260 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 292582 4cc3a32beb6a18a7b8c97f0e174f7eb6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 12417806 4fbf262234903a4eac5f36b2a8a0b11e http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge1_i386.deb Size/MD5 checksum: 2158 a83bda3df1131288d169b1c44d2f6f95 http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 477608 0dfded776cb25f87885f3e2cd54139fb http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77586 7a73742b7405143708835f3932f9fa70 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb Size/MD5 checksum: 2198 53f3a8546c48f4872424f905cf7885b0 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb Size/MD5 checksum: 2248 130656ebcf35178df320c2f80ff446b3 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 298294 040778c609195abb76faf5dc6b2c4484 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb Size/MD5 checksum: 2180 ed27ff9b477d3f06a89636ff63c1a608 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 286360 256a7cfba28e8f80e5ed1b36d463bbaa http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb Size/MD5 checksum: 2198 73159b5fcca4e503e4e39d26d01f611b http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge1_i386.deb Size/MD5 checksum: 2152 bf549dc4754ad6432ec6a9133c288b55 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge1_i386.deb Size/MD5 checksum: 2182 32ef20edb04d84ae67b59ef74ca73c41 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb Size/MD5 checksum: 2250 8fe3e928f92a4148cf5aef691717defd http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb Size/MD5 checksum: 2226 11a3d9e97540823f189274cbf0964f40 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb Size/MD5 checksum: 2268 eb19757eb174ca892c60b9ca003f6993 http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 93990 ddf78ba3ee58f63c3ebb6ab2b686cbc9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 11709566 cc9d039b9cec5d5532023bffd1e13203 http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77734 5e4b8007c196b17ee41776406b0b8230 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb Size/MD5 checksum: 2178 a47be61afd7e8d4b63eaa0d5facec45c http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb Size/MD5 checksum: 2176 cd6cfe3b2f4d398d759906817afafdf9 http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77604 c427abcb6f60c5bf1ac10bc19a65a8b8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 12680486 1cb5b20b959b842df55c59a72278c084 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 258980 ed75fb59949e2364abfc9459a4832fb3 http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 56466 54f5cb20cca23c63adb22dacd6710641 http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 477594 429eb2dd9bec9b005332f8025849f378 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 303960 7163cde6ff6fb60f77c3be86b98c9ed9 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb Size/MD5 checksum: 4770342 c029fb318f3e99e16df3cc4431f48b06 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 300096 d72f151d92cd2b9e3b32247987bc9d77 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 259296 a1674fac85b1dc7aaf4e43099bf6de5c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 297542 e374488c0c43422a644ee1d8d5687f89 http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 474438 5bad3d0b235b6dd4e13d1cd124dc0b8f http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge1_i386.deb Size/MD5 checksum: 2200 3641ec5e13ebe5cbf5713d7b6a9af77a http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77592 9655842dd75143b38d9591c05c069ac7 http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77674 f068190e67295066533fb3fff111c814 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 8342 a1fe9c769945a7635ecc03b1e187e7fc http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 259850 b623d22abc6f054d77b7a30917f08009 http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb Size/MD5 checksum: 77678 0a7beec37cd1bf7ec8f1731ae9d6bb9a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 12086466 5af66657e22fdb6314119ea36a6c1c75 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge1_i386.deb Size/MD5 checksum: 2188 d2c285ee0c9bc108e0d4cd2e678bc6e0 http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb Size/MD5 checksum: 484198 53b2e26c3a6892fe41301e31a8e91701 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge2_i386.deb Size/MD5 checksum: 298018 9d13a45679af6957abfc23b8878073c4 http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge3_i386.deb Size/MD5 checksum: 77968 bd243ceab2becfd668549358465abe69 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 16976446 51987cad8f3f6eb3281ce356f736f90d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 17021738 57ead1bebe1a5f0eccc071e6a5f30f54 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 4986 e10834d87d38a13a5c2ee5f13eed4d02 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 240590 4f512fc8f28e2a11cdd97569319d90f5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 240498 d4a0592c1014cd8d2d3b87ae052ff995 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 4956 bd7812c913d7ea5ce87e8a249b8935af http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 5226 d74eb98006da5dab26589509ded5f29e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 239378 83101f13dbb75a77ff1a2685c1b59bfd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 4992 7ba2aacc74bc4ac4370d2b6bf221e35a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 4687006 1230148f08b0c17763e79b94986bc9bd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 4972 bfd5bcd58354b443c53a13bb6708be37 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 16621676 1bd285f8adedf710b1461724b0af8a61 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 239426 87381161e1e8d269ab82e51518cf79c4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb Size/MD5 checksum: 16667452 ca44e47123ea32e0efe93bca7794de8c Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2320966 4a15213792fd9ef48330cd67f767ab9d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2636422 ce2e589e3f58a53dcbbe362aa06bbdc0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2394430 d0d19d564536a6640fe1401b91830a05 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2393560 c8afb24f7148596650c8140bdad7aa0a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2260368 28858d5d8037969dddeed9eb787edae5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2543228 6b5c2fdb57f7618bd884a56775fddea0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge2_m68k.deb Size/MD5 checksum: 2475286 a6f7278b437e2c9f1efaf8230a7cf038 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge2.040815-1_mips.deb Size/MD5 checksum: 3848722 3cab75f38b72bff67ea0dae8239d2d8b http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge2.040815-1_mips.deb Size/MD5 checksum: 3847778 f250503d744408577b15430e62b73f28 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mips.deb Size/MD5 checksum: 7173140 99adeeb4f9a7ee12dbdd658311d4f641 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mips.deb Size/MD5 checksum: 4680422 75df59733690bc09bd5c854ab7cabfbd http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mips.deb Size/MD5 checksum: 18136 4ec345ef0b666b186646c2c209a9fda8 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 2136150 2f180ceeeff353b1ac0e7a2a2869badc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 4101818 b185a2cb8c1345d07c4f58f079c8abc8 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 4668528 ce59d155e7f5de0b9512c8ae07e7d19f http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 2990238 2305898af4fbe07fb3b86a3658926b2a http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 18174 c5f6f20831a72ba867d251700636c30d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 3031148 0b84aa08bbd98a75b3c6e615dc78acd5 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 7037466 690116f5951c221bfbbe94838a1afe0d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mipsel.deb Size/MD5 checksum: 4685148 27568e054ecb5cfe22665cf3e4220d25 PowerPC architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 8722 fcfa53d79c741eb526efd83af6b77501 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 4800060 9c3bc9afe4bde5642d352199bd6910bc http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 1815364 531c6100c8a5ae8cd54a92c47935cacc http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 12749452 d1460d74881e9dee0abe8f1e66edc940 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 8796 b29ec0ebb05f2980425452ff60efc78d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 65486 0aa2289da231fdcca1311650e9a7ecd4 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 2496580 506d7979b6b2ec7fe1485f7bff41a7be http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 153562 7d17ab040429b0802cbeb4a45ff4ed6a http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 13478332 65955c570b7d715dae51503d24248214 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 139374 14c07ada6bc05f9fdf9330d295ced263 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 153260 16794e5cc21f355da1df4153744d2cdc http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 4692188 97f4f54124d47127aaad6b30b68fda7b http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 13785186 9892ac04d3c9390c6a711a32af828152 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 4682152 1f4e90348fe6a188a2360f57493c0516 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 153314 ae274ab60fad595683c4decfecdd12de http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb Size/MD5 checksum: 139174 7664ec4c4b8e49aad2271d8f9b91fa59 IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb Size/MD5 checksum: 1894 7c7d6ffff4091efa73369deb17b8c3a7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge2_s390.deb Size/MD5 checksum: 2775998 6574681ce171f9a74f7565ea3f3ce3f1 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb Size/MD5 checksum: 1882 b2315be9f4c33a570f0da301890dd95d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge2_s390.deb Size/MD5 checksum: 2967840 2ad64001085223fdd5f330bbbeb74e81 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge2_s390.deb Size/MD5 checksum: 4577766 84aa474690a106c530558c478aff3a93 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb Size/MD5 checksum: 1900 1db72f0edc5d91d2e33521c672348378 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge2_s390.deb Size/MD5 checksum: 992372 6c160c930e44a2e995d6db92ded45ce4 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge2_sparc.deb Size/MD5 checksum: 2208 615b8dfc3a03f9e888299159ec75c56d http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge2_sparc.deb Size/MD5 checksum: 2216 622f8ddd76acaf9328e54aeb86c85def http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge2_sparc.deb Size/MD5 checksum: 2208 d186163b6921a0d8dee98401b2dc2396 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge2_sparc.deb Size/MD5 checksum: 2218 b9963b97417cc1e4f8c5ab0ce51e5bf2 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge2_sparc.deb Size/MD5 checksum: 2184 a7d486f2c4a3c08a1aeb3b31351591d7 http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge2_sparc.deb Size/MD5 checksum: 2198 7c0fec52b6b0ae094e68846451ce79ea http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge2_sparc.deb Size/MD5 checksum: 2188 475e7a109600079559506774c5a822eb http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge2_sparc.deb Size/MD5 checksum: 2200 3d1f9342a18271db94000bfeeebbd63a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 3785134 7ed118f20b7aa0065d8dc51c5f7015fc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 3598262 8077cc063a9638f64caa0b7501be6698 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 202410 925e828aac054961b71f4cb853a1a81d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 162680 8daeded3c5c21dadbc16fcb57e17ba0c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 201200 b8d59c4959f3641efe0825be35475b60 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 8358 6721b433e723689deff7a75c1a152436 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 6377516 987de05fb71c80488eac9f9fa0be3dab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 6544548 60fe57c18de3491548b4d2bf1bf2ca9e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 164444 a4bbab66bcb9f637efb72ec48f4756c2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge2_sparc.deb Size/MD5 checksum: 2023602 04be2535bd4ea027a3167ae6aec300c2 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEM3UGXm3vHE4uyloRAs/HAJ0VVf8YyuaX0cO2Ho4UbAlTGsqDlQCghQNX pFzLAoVDMS2B8sPYedFiwfI= =eiPu -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/