-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1237-1 security@xxxxxxxxxx http://www.debian.org/security/ Dann Frazier December 17th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : kernel-source-2.4.27 Vulnerability : several Problem-Type : local/remote Debian-specific: no CVE ID : CVE-2006-4093 CVE-2006-4538 CVE-2006-4997 CVE-2006-5174 CVE-2006-5649 CVE-2006-5871 Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4093 Olof Johansson reported a local DoS (Denial of Service) vulnerability on the PPC970 platform. Unpriveleged users can hang the system by executing the "attn" instruction, which was not being disabled at boot. CVE-2006-4538 Kirill Korotaev reported a local DoS (Denial of Service) vulnerability on the ia64 and sparc architectures. A user could cause the system to crash by executing a malformed ELF binary due to insufficient verification of the memory layout. CVE-2006-4997 ADLab Venustech Info Ltd reported a potential remote DoS (Denial of Service) vulnerability in the IP over ATM subsystem. A remote system could cause the system to crash by sending specially crafted packets that would trigger an attempt to free an already-freed pointer resulting in a system crash. CVE-2006-5174 Martin Schwidefsky reported a potential leak of sensitive information on s390 systems. The copy_from_user function did not clear the remaining bytes of the kernel buffer after receiving a fault on the userspace address, resulting in a leak of uninitialized kernel memory. A local user could exploit this by appending to a file from a bad address. CVE-2006-5649 Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) vulnerability on powerpc systems. The alignment exception only checked the exception table for -EFAULT, not for other errors. This can be exploited by a local user to cause a system crash (panic). CVE-2006-5871 Bill Allombert reported that various mount options are ignored by smbfs when UNIX extensions are enabled. This includes the uid, gid and mode options. Client systems would silently use the server-provided settings instead of honoring these options, changing the security model. This update includes a fix from Haroldo Gamal that forces the kernel to honor these mount options. Note that, since the current versions of smbmount always pass values for these options to the kernel, it is not currently possible to activate unix extensions by omitting mount options. However, this behavior is currently consistent with the current behavior of the next Debian release, 'etch'. The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.4.27-10sarge5 Alpha architecture 2.4.27-10sarge5 ARM architecture 2.4.27-2sarge5 Intel IA-32 architecture 2.4.27-10sarge5 Intel IA-64 architecture 2.4.27-10sarge5 Motorola 680x0 architecture 2.4.27-3sarge5 Big endian MIPS 2.4.27-10.sarge4.040815-2 Little endian MIPS 2.4.27-10.sarge4.040815-2 PowerPC architecture 2.4.27-10sarge5 IBM S/390 architecture 2.4.27-2sarge5 Sun Sparc architecture 2.4.27-9sarge5 The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update: Debian 3.1 (sarge) fai-kernels 1.9.1sarge5 kernel-image-2.4.27-speakup 2.4.27-1.1sarge4 mindi-kernel 2.4.27-2sarge4 systemimager 3.2.3-6sarge4 We recommend that you upgrade your kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge5.dsc Size/MD5 checksum: 831 b970d762bf162cdfc8df32549bbdd566 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge5.tar.gz Size/MD5 checksum: 32299 1007b0e6ba417ea12969e495056b2d5e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge5.dsc Size/MD5 checksum: 840 381052d0f0e53b867b8190d9bf0e0d1b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge5.tar.gz Size/MD5 checksum: 34450 4fe66843eb3dde9636a292726b0720ca http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge5.dsc Size/MD5 checksum: 1581 f670c9495d1e6b3fc0dae34079be2703 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge5.tar.gz Size/MD5 checksum: 99762 689742b819b03635be81e56f236f015b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge5.dsc Size/MD5 checksum: 1143 aa5d275cbb5e611a430558c75d2ddce6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge5.tar.gz Size/MD5 checksum: 55593 e8517a3876c679cf01ccdbdaf666c4fd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge5.dsc Size/MD5 checksum: 876 7416f4d8d7d4d468977f966d6cb680da http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge5.tar.gz Size/MD5 checksum: 12864 5d32bbaecfcef58ac406939346922caa http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge5.dsc Size/MD5 checksum: 1074 cf00f7439b32b998ac35cf9bc0ba17ce http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge5.tar.gz Size/MD5 checksum: 24784 bb76d31c4e97594546a1ce46205627be http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge5.dsc Size/MD5 checksum: 832 61fe3968d2b8e2a0ae27d86bdadd82dd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge5.tar.gz Size/MD5 checksum: 10570 982fd40704097c18838e3954de9d946e http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge4.dsc Size/MD5 checksum: 732 ea5120c744a0c6680bd77bc262018e6d http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge4.tar.gz Size/MD5 checksum: 18921 f898a597de3f981b99848160f092f06e http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-2.dsc Size/MD5 checksum: 1051 007ebb5db36532e0bef9462411d7a25b http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-2.tar.gz Size/MD5 checksum: 309221 e9154cdadd12cf9d3042fc3c69906796 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.dsc Size/MD5 checksum: 1131 6b22f4ecad2ce3d2404d606c77da9dc7 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.tar.gz Size/MD5 checksum: 1464751 d1891087138beef4e77784e3b29230b5 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge5.dsc Size/MD5 checksum: 900 6b7eaed1211e79eeb7822c470588dc10 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge5.diff.gz Size/MD5 checksum: 755526 437a36887a3730d49c6681e163085c91 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge4.dsc Size/MD5 checksum: 750 49de53f3e66da5396a7c447411eda404 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge4.diff.gz Size/MD5 checksum: 5089 400dd7c2ce12ba55e876cb90a035095f http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301 Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge5_all.deb Size/MD5 checksum: 3581076 e1bbfffc57dbdfd0b9cd2d0a66a7744b http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge5_all.deb Size/MD5 checksum: 710724 9535988810d9c8f3f4019720bd49a30b http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge5_all.deb Size/MD5 checksum: 31034148 28894dd804436675aedfc296a8ee4d63 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge5_all.deb Size/MD5 checksum: 27696 90eb280799013da95a3c1188e8b84d50 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge4_all.deb Size/MD5 checksum: 2420804 1a05dca524994806146a6900efa71899 Alpha architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge5_alpha.deb Size/MD5 checksum: 8074 4f676244465a1b8492343ffc27de9b7b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge5_alpha.deb Size/MD5 checksum: 4574778 a40c45730f344deb8cfcc1d1a7ad2488 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge5_alpha.deb Size/MD5 checksum: 273276 95820aca7779957cdc5b380de2241a4d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge5_alpha.deb Size/MD5 checksum: 275206 01567b6608388db6ecbea1a4cfa5a99f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge5_alpha.deb Size/MD5 checksum: 16531732 f6b0507544d219740e11894d49906179 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge5_alpha.deb Size/MD5 checksum: 16983616 735c022a0d097f46a03348fe91a6e7ac http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_alpha.deb Size/MD5 checksum: 20480 505188720fcfed347602c30bb1cd5f6c ARM architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 483596 fe85544eabe959ce72f05dda8d65185a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 4726650 4729ca286f8e2314f6c5cdfaefbe93aa http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 1695008 4beae00e1c3e83463a772fe17aebc80f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 1059362 ee2f850805f19c7fdfdb8c866566cc56 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 7376966 26755e712c14e0003b0d599ccc1bac98 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 3165708 f673a41f1403e7a85e9cdbfc6cffb23b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge5_arm.deb Size/MD5 checksum: 3687138 022d79de206311aa2364e5449915a94d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_arm.deb Size/MD5 checksum: 18868 b0530590361123733515d0cd21bb01c9 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 10534 c2e539824425af065b4617aa3589b782 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 1825394 6ca7de755e3890e989cfaa2271a0ba3d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 299390 5973792d7e12022780b7d4d51e1f2372 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 300664 948a088ae36738d5de11375009a162b6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 300562 620f476d04bfe3a906b9110d9495f902 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 302114 14db999e3504855ab0239341e41b8d0d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 299548 6b842b2221e6afa94332d6e2e434f5e2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 300286 483ea0ad7316d1c82e1d667d8826d536 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 302128 d5f9b05985e032d4ce522283566b0fdd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 11052302 255d69882c14e9a92cf951b2fff9263f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 12036374 f576550eacb4d17f1388b89ce9615f06 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 12355204 cd85e4ca2b25cecddd0077b4eb47a0ce http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 12695118 31480c61a3ac3c71d4a1b9703b8d8139 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 11723728 3e4e06b330cd1ac479769baac326df7b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 12098618 541559dcbaa99bbd02642fe31b063ffd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 12434342 5813dbe009eea4141a872752874f0335 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 269980 77410fc804084d2169ceb1319a9e690f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 294862 b6270e45a1acfc537b6d9ba474e163d7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 300698 939c08139e1e17f754d9d676ca3f9c04 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 306442 507f4d8c295e1c4549b06ded67009b98 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 288692 900499f7b356261f9859d051c96a54e8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 294624 64620786d42099ead5e5bdb829f7c573 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb Size/MD5 checksum: 299512 6a06f4d16650536bdcd1dd7f44851a3d http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb Size/MD5 checksum: 4773910 8c3955d4fa6d3af721c7d820a2e9d5a1 http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb Size/MD5 checksum: 11308946 ac2eca7ddc6e0fcfa0b7d835b28d3c41 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_i386.deb Size/MD5 checksum: 16632 bab2d60567d5858c019407cca58d6688 http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge4_i386.deb Size/MD5 checksum: 7775346 31814a4d66ec8053772ad147a4a62b26 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 7486 b40d48a972ee0cb277b63a649e0d01f2 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 4689752 b5ef21aee13412359cdb7fb5e039de74 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 242570 3dbd1ce3bbfed1c7c4aeb3de2396cf77 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 243234 14ed081560b4008f6e391b325b39544f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 242366 4acf18300727b24afe4f223623e5c44d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 243558 f48e9a34ea714966024f24277293d1d6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 7262 4cc86fa5dd7f157ab7fa3747f9ac8573 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 7274 7b6dec36049b6f277b72c2c6a24dd538 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 7290 00cf535d95cb5a827d53219de9d2b0a1 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 7302 093e0825e05675fd728a7db694531f1a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 16677620 d997c6d47e3592b0ab8c82917548102b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 17037020 75b4b47d8ebd8cd91327cfeaf76dd0d9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 16630570 11c5c2ea12f3cab5865b225f765d71c0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb Size/MD5 checksum: 16988538 f8b022aa39e91bccc24ab3adaab2c7aa http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_ia64.deb Size/MD5 checksum: 22224 a4d38a63b6bd0399aa84d50d23f09cf6 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2642370 64f44bc3e9c3313cb7aecf789ddb51de http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2545710 6dcdfedd3356d0f20e7899da7a7ff2bd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2396790 5d278c185e1ca1d34e65dc657cbcbe96 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2478704 181df694d051555f0253ff27e9f0863c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2326206 033f694ed1a6acc24efb07ecdbbe125c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2397324 f716f0313d88c62779569712078ae0c8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge5_m68k.deb Size/MD5 checksum: 2262406 c0c6fbb7a1160688f8e8c7ae97d43e9a http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_m68k.deb Size/MD5 checksum: 16338 f9b14151760944376dfbbbfc47b73346 IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge5_s390.deb Size/MD5 checksum: 4579864 fc815cfb54bdfed711c2c09fae740500 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge5_s390.deb Size/MD5 checksum: 2782140 11029023c05ea13dc51206e74bdb2391 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge5_s390.deb Size/MD5 checksum: 995678 a642f56da45718fe0a665ad1836f6112 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge5_s390.deb Size/MD5 checksum: 2974550 749696ce8a74c220819579cb14ebff3a http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_s390.deb Size/MD5 checksum: 19338 c86219a43c645a82ee1782d94dc6dce8 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 10550 164dc9869ea386fd3169864645d89a98 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 2025304 c036f26f3bb2c1a7f1acc7588b54c389 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 164532 18adb86c0d3ce5b6424b277ce2e39794 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 166318 d3fa63eab9ddab3f6b5db8f385ffe458 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 202940 c03ec973495d21f03df3f156c3dc033b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 204266 547fb57dd64584ee765c427d2c0554fd http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 3605072 14ac1e3ce17cbf64bfd7a61f520cf494 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 3792788 38ef858c0ff9158cf44590782f5664e0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 6385736 5dfaf6a6a6e5a809a38458ef79661d3b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge5_sparc.deb Size/MD5 checksum: 6550182 97b6ef3ce231c448687bf357daae4faf http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_sparc.deb Size/MD5 checksum: 18200 1465507e83184c1c32b2015530dc39c9 AMD64 architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_amd64.deb Size/MD5 checksum: 17252 8c0ddf9b2b2c5f7ac695d7f10af7aeb5 HP Precision architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_hppa.deb Size/MD5 checksum: 19334 22608a5cbf78b9dfb49a91685513485e Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-2_mips.deb Size/MD5 checksum: 4681544 e5ad300c16978417dfdb04a55b3cf505 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-2_mips.deb Size/MD5 checksum: 3854770 6fb17fc57af59997c55dc5d15fe86324 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-2_mips.deb Size/MD5 checksum: 3857642 135e1590f21c14db5765422dadd03571 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-2_mips.deb Size/MD5 checksum: 7186300 c841f01587ec79fc411bda056d663a04 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_mips.deb Size/MD5 checksum: 20448 02fd1e80e83a5c3e7b6b16832b77cc26 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 4686676 eb7e81b8a3a6829252a02251aed92b08 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 3037974 ea0208a51612c1e34a6aa60410d21c3d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 2999656 ec0c25c38b5e7a8a65142bbc52b8220d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 4107630 deefd96c7f6b2e3e954c98284d367e61 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 2141986 e3ea6afd27d393fcdf6b20a755fa7a41 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 7048130 dd624bc0af5d1e39be9084a58ad575d5 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 4677566 6179a00efde69e2bef158f584b667bc9 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_mipsel.deb Size/MD5 checksum: 20488 41476ba7fba16f7453c72fad3ac7279a PowerPC architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 143604 dbd3e6559ab4d24640e78fa5096b8d4d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 143402 0ac835db06b6feb1b662ffe7cee6b1ca http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 157358 df24d8751cee33c2ec3490fe3c58aab5 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 157652 f95e05ad17a85a314f36ad794231bd19 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 157408 19f3fa73f641f93a734b5a0c1d92800a http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 4684386 33f89f6ff68d4697590dc56da8f5c85b http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 4694600 0d7e24209c0c22ad726ddc7d2046f5e4 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 4802248 dc4bb7170432243f61d1ccf10820518f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 2502696 794593451ab3047561014f148290650c http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 1819296 026d70d2989c1f5345280777f8430d33 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 13486360 c02196059ed6f7103d6faa2a45320828 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 12759400 e9108a2f987765ff915435b199bda15e http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 13792416 3af28a8ab21e298043311c0e15b19184 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 65868 b0f73596dd19e6c41d0fa64f5c3d7e22 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 11006 c537fc249b24e8d4c57165e6f4d6ad5a http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb Size/MD5 checksum: 10928 11f29b35752d4f50ea28b345001efb2b http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_powerpc.deb Size/MD5 checksum: 18902 a8338f398511cd07bd619b812f18d76b These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFhU8VXm3vHE4uyloRAqyaAJoCjTG8pCP4OuaLqSRiqr2F/TIh0QCg0oNv cX7kv9vIm6CBHm4dJqv7whM= =e1p5 -----END PGP SIGNATURE-----