DSA 1017-1: New Linux kernel 2.6.8 packages fix several vulnerabilities
Posted on: 03/24/2006 12:22 AM

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1017-1 security@debian.org
http://www.debian.org/security/ Dann Frazier, Simon Horman
March 23th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : kernel-source-2.6.8
Vulnerability : several
Problem-Type : local/remote
Debian-specific: no
CVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 CVE-2006-1066
Debian Bug : 295949 334113 330287 332587 332596 330343 330353 327416

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2004-1017

Multiple overflows exist in the io_edgeport driver which might be usable
as a denial of service attack vector.

CVE-2005-0124

Bryan Fulton reported a bounds checking bug in the coda_pioctl function
which may allow local users to execute arbitrary code or trigger a denial
of service attack.

CVE-2005-0449

An error in the skb_checksum_help() function from the netfilter framework
has been discovered that allows the bypass of packet filter rules or
a denial of service attack.

CVE-2005-2457

Tim Yamin discovered that insufficient input validation in the zisofs driver
for compressed ISO file systems allows a denial of service attack through
maliciously crafted ISO images.

CVE-2005-2490

A buffer overflow in the sendmsg() function allows local users to execute
arbitrary code.

CVE-2005-2555

Herbert Xu discovered that the setsockopt() function was not restricted to
users/processes with the CAP_NET_ADMIN capability. This allows attackers to
manipulate IPSEC policies or initiate a denial of service attack.

CVE-2005-2709

Al Viro discovered a race condition in the /proc handling of network devices.
A (local) attacker could exploit the stale reference after interface shutdown
to cause a denial of service or possibly execute code in kernel mode.

CVE-2005-2800

Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices
leak memory, which allows a denial of service attack.

CVE-2005-2973

Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code
can be forced into an endless loop, which allows a denial of service attack.

CVE-2005-3044

Vasiliy Averin discovered that the reference counters from sockfd_put() and
fput() can be forced into overlapping, which allows a denial of service attack
through a null pointer dereference.

CVE-2005-3053

Eric Dumazet discovered that the set_mempolicy() system call accepts a negative
value for it's first argument, which triggers a BUG() assert. This allows a
denial of service attack.

CVE-2005-3055

Harald Welte discovered that if a process issues a USB Request Block (URB)
to a device and terminates before the URB completes, a stale pointer
would be dereferenced. This could be used to trigger a denial of service
attack.

CVE-2005-3180

Pavel Roskin discovered that the driver for Orinoco wireless cards clears
it's buffers insufficiently. This could leak sensitive information into
user space.

CVE-2005-3181

Robert Derr discovered that the audit subsystem uses an incorrect function to
free memory, which allows a denial of service attack.

CVE-2005-3257

Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.

CVE-2005-3356

Doug Chapman discovered that the mq_open syscall can be tricked into
decrementing an internal counter twice, which allows a denial of service attack
through a kernel panic.

CVE-2005-3358

Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()
system call leads to a kernel panic, which allows a denial of service attack.

CVE-2005-3783

The ptrace code using CLONE_THREAD didn't use the thread group ID to
determine whether the caller is attaching to itself, which allows a denial
of service attack.

CVE-2005-3784

The auto-reaping of childe processes functionality included ptraced-attached
processes, which allows denial of service through dangling references.

CVE-2005-3806

Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,
which could lead to memory corruption and denial of service.

CVE-2005-3847

It was discovered that a threaded real-time process, which is currently dumping
core can be forced into a dead-lock situation by sending it a SIGKILL signal,
which allows a denial of service attack.

CVE-2005-3848

Ollie Wild discovered a memory leak in the icmp_push_reply() function, which
allows denial of service through memory consumption.

CVE-2005-3857

Chris Wright discovered that excessive allocation of broken file lock leases
in the VFS layer can exhaust memory and fill up the system logging, which allows
denial of service.

CVE-2005-3858

Patrick McHardy discovered a memory leak in the ip6_input_finish() function from
the IPv6 code, which allows denial of service.

CVE-2005-4605

Karl Janmar discovered that a signedness error in the procfs code can be exploited
to read kernel memory, which may disclose sensitive information.

CVE-2005-4618

Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which
allows a denial of service attack.

CVE-2006-0095

Stefan Rompf discovered that dm_crypt does not clear an internal struct before freeing
it, which might disclose sensitive information.

CVE-2006-0096

It was discovered that the SDLA driver's capability checks were too lax
for firmware upgrades.

CVE-2006-0482

Ludovic Courtes discovered that get_compat_timespec() performs insufficient input
sanitizing, which allows a local denial of service attack.

CVE-2006-1066

It was discovered that ptrace() on the ia64 architecture allows a local denial of
service attack, when preemption is enabled.


The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

Debian 3.1 (sarge)
Source 2.6.8-16sarge2
Alpha architecture 2.6.8-16sarge2
AMD64 architecture 2.6.8-16sarge2
HP Precision architecture 2.6.8-6sarge2
Intel IA-32 architecture 2.6.8-16sarge2
Intel IA-64 architecture 2.6.8-14sarge2
Motorola 680x0 architecture 2.6.8-4sarge2
PowerPC architecture 2.6.8-12sarge2
IBM S/390 architecture 2.6.8-5sarge2
Sun Sparc architecture 2.6.8-15sarge2

The following matrix lists additional packages that were rebuilt for
compatability with or to take advantage of this update:

Debian 3.1 (sarge)
kernel-latest-2.6-alpha 101sarge1
kernel-latest-2.6-amd64 103sarge1
kernel-latest-2.6-hppa 2.6.8-1sarge1
kernel-latest-2.6-sparc 101sarge1
kernel-latest-2.6-i386 101sarge1
kernel-latest-powerpc 102sarge1
fai-kernels 1.9.1sarge1
hostap-modules-i386 0.3.7-1sarge1
mol-modules-2.6.8 0.9.70+2.6.8+12sarge1
ndiswrapper-modules-i386 1.1-2sarge1

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

This update introduces a change in the kernel's binary interface, the affected
kernel packages inside Debian have been rebuilt, if you're running local addons
you'll need to rebuild these as well.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc
Size/MD5 checksum: 874 a35d48f0d5b6c679b5130fb3aaa647cb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz
Size/MD5 checksum: 14256 7c44e2e875b7995f5bb14effb5684b7d
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc
Size/MD5 checksum: 1004 f98203872db1017d6053ababb496116d
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz
Size/MD5 checksum: 1015096 0bb501098f732e6750e3413f4e9d148f
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc
Size/MD5 checksum: 896 caa3c2d1f06666c61ba31917a3c26b1f
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz
Size/MD5 checksum: 2396 d71945b6f493574ce0d360de316f1873
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc
Size/MD5 checksum: 685 54417bc7eddc5722e0f5ce734e67edb9
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz
Size/MD5 checksum: 1954 1cdaccf68580892b42cd88b5c5b03b9b
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc
Size/MD5 checksum: 786 e99a3432c467f4f76e9b6e852333a9c5
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz
Size/MD5 checksum: 2123 d90ea9aa1ccb9ad3041d5d3b20894330
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc
Size/MD5 checksum: 813 e860fc8f679fdedb3817d09e25c77b66
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz
Size/MD5 checksum: 2055 3fb20a5238ac6dc6a84ba67a887d752e
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc
Size/MD5 checksum: 621 c8d489fa28bd6b65bd3bda1a460d8a08
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz
Size/MD5 checksum: 24387 25e9d10a881601e9329291faf5110b55
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc
Size/MD5 checksum: 993 6cd9024b61b9a6cf4862e204d330b9a3
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz
Size/MD5 checksum: 2661 d7bf35beb4924d8dab10b08380e9e289
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc
Size/MD5 checksum: 862 9d55e1790bcc518f315b44a52ed331bc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz
Size/MD5 checksum: 2286 1e9932ed547a85a43b82c10ac9b11800
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc
Size/MD5 checksum: 1047 8fa892195f50896a45f4a2c64f66ce11
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz
Size/MD5 checksum: 89240 5987c1e4d49bb7b3159f3a42b22d1e4f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc
Size/MD5 checksum: 1008 9c8bbaf47e657e4ac707c6f35cee0f2e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz
Size/MD5 checksum: 65886 0f42b0e9fc22cd2d5eb615d8f4f6922d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc
Size/MD5 checksum: 1103 df823aaf30d2d39f51762abf0fdab8e4
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz
Size/MD5 checksum: 74018 415ea9bd8c15a343646a762c7ecbeb2c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc
Size/MD5 checksum: 812 3689bf78b872510caeaeaefe3a76b477
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz
Size/MD5 checksum: 37429 69216b4fe13afb383e5559e4100439ff
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc
Size/MD5 checksum: 1071 f1d5f3c6a58c3b2efbecb6f481bc6e13
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz
Size/MD5 checksum: 25410 78cd732eb81df1bae3f513eb68aa95c0
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc
Size/MD5 checksum: 1191 8a58beb88416f8235e0ccf91b94bda5e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz
Size/MD5 checksum: 62533 d3a0fd97437e9eb69f07b5297246610b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc
Size/MD5 checksum: 833 aa306a38d5cf9f45e601633d239f868e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz
Size/MD5 checksum: 11437 2c70d8408f9656fba114ee59f22cb44b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc
Size/MD5 checksum: 1036 b2db64932de00311794a14eaded25ec3
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz
Size/MD5 checksum: 22798 9d94f73ab654770fc251125e1332b2be
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc
Size/MD5 checksum: 703 f5c46506673becb263a62307591041b9
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz
Size/MD5 checksum: 4326 f6191f77c2f41e397e47b727b30d1f64
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc
Size/MD5 checksum: 1092 926d84df8f84a7c9cc68add4fee27427
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz
Size/MD5 checksum: 2273 896ab1f6cbb18b1afd092845b8e12523
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc
Size/MD5 checksum: 894 97a270d1e39bfd032314dc3171831846
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz
Size/MD5 checksum: 1782 1c5a70ee63b83630319152768b924a98

Alpha architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb
Size/MD5 checksum: 1980 0f1542a109fbe036fb8af44e20397299
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb
Size/MD5 checksum: 1980 d75c152fdab411ad8184ba6331015dcd
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb
Size/MD5 checksum: 1980 69be478f2fa35a994c02a4f3b450a60e
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb
Size/MD5 checksum: 1990 3ca05863dcaa11c43c0c7d4c29e4ddfd
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb
Size/MD5 checksum: 2758214 0ecffff87c9a03f6f19147c61a5fc48b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb
Size/MD5 checksum: 230730 3b29ce53073ac08216153a5d6e4b629e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb
Size/MD5 checksum: 225634 316c8d48a8a59da90707fb03e2149bc0
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb
Size/MD5 checksum: 20218454 9d8030373efb6dc3e2dfded09cf5c0d5
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb
Size/MD5 checksum: 20068918 710fee78a9ffbde5694b71af50e0060c

AMD64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
Size/MD5 checksum: 2104 ef0b887f5fbe7a50eb29b9f758f4dbe7
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
Size/MD5 checksum: 2112 99fc45919e4e99c75b9c9caa96892684
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
Size/MD5 checksum: 2110 56ce795b6f72a01261f554d7f80e17f7
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
Size/MD5 checksum: 2126 687cd2d07a2216bd06b3e7167c34429a
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
Size/MD5 checksum: 2122 80b347bd1c3b75ba8e6019eb4515131d
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb
Size/MD5 checksum: 2158 593b2f6857005238309652f1ed07b025
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb
Size/MD5 checksum: 2166 c195509461a3829a88149ecb25dbcd3a
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb
Size/MD5 checksum: 2172 d87ecb48ff4c9706e28bee9b5e523f0d
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb
Size/MD5 checksum: 2218 28145de5465f3149b0fb7182c07e2dbb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb
Size/MD5 checksum: 2248 a709d2651b5bc6f16a46e482513ffd7c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 2720186 0db767733816d0a1d4a5e9840348532b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 224506 7b32141a97738499376939faf694b031
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 223506 3461e58701032b00a0340f931af02325
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 219164 e3841dd8bc0d6a326a2b186a2febe880
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 221058 aa43b631e5516324f5e357a50bf03919
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 217500 181e3fa415a02835b62dc538562650bb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 12560178 13c61c6f63e666a2da9d35e9b4b829b3
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 13251702 4a87624ae820a7fef519660321ccd002
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 13213610 6f574e36cbe1c9adbac496968998d389
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 13061358 d9bdb5fdcd2ca14594b4c4eeb0ec4e95
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb
Size/MD5 checksum: 13044562 61005d327a9ea9efed46625e79710689

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb
Size/MD5 checksum: 2106 fcb23b2830bed29439b86f0174bc36b0
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb
Size/MD5 checksum: 2126 4261e8ea28972c4b1a0328491c142e9d
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb
Size/MD5 checksum: 2114 3a59ea468ed72766258d4c6d4ca721d9
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb
Size/MD5 checksum: 2134 bfbd467ce5c19e5e1909beb867da57c6
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb
Size/MD5 checksum: 2130 8c3cb8de73fecb230bf869dce2e92e9b
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb
Size/MD5 checksum: 2160 3fdac05d7afc2d522191b8672310e3bb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb
Size/MD5 checksum: 2168 78248b7c5024afdd3e8bcf8f3b85fdd0
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb
Size/MD5 checksum: 2180 33dbe8a50cd2deb102b2c26c3451cb0d
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb
Size/MD5 checksum: 2228 8f87a7c45040d6192c7dd7521719bb84
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb
Size/MD5 checksum: 2250 0220661e0e1c24c0248a54ed13f93e96
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb
Size/MD5 checksum: 2150 f710e37e9e5af100ef65b167020739ca
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb
Size/MD5 checksum: 2184 0dcabd1f69fe86bb1d431f193d032a5d
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb
Size/MD5 checksum: 2248 88dbce576e5ec5b484085f0e7f204b1c
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb
Size/MD5 checksum: 2160 459222cd722e8c592fef62a5e64d2e29
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb
Size/MD5 checksum: 2228 a528e1e7db01a3280a2bab86383f8f9e
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb
Size/MD5 checksum: 2152 64f8938c4ccf9a567ace8906474a3a05
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb
Size/MD5 checksum: 2182 3fc7225f53712469830cb60404598287
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb
Size/MD5 checksum: 2252 97cc65172e9583cf0299c68e53b2dbc3
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb
Size/MD5 checksum: 2164 cbd1dd8a0dc39c35598c131e0473ce46
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb
Size/MD5 checksum: 2232 5a55c3acad554351348c2c4bbe9347b9
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb
Size/MD5 checksum: 11986970 3f1f1b972c9aea7e324d3f16252c1a14
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 2777384 1bb1a12e5057dff0213af9d62e204e1a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 256932 4ffede1559073c0fac6256ebf6bf0fa2
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 254820 e24193f1e1a4e0f19e4f6dea078b94a3
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 251726 9afbac1038d98e6377a02ff6aebb3441
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 254918 e32f308990db81bff7295a4724dfa23a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 251742 c4ad3e4f52e907067a44f25214b6b34f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 14064090 7801ebccc8aaa6cbdf94b8f97c017f17
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 15534482 11587d9502f913721dde8c98fef3b676
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 15343922 cc4689243c7fc2134bb4b6e89e44668a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 15260668 839c21112982d20f38b3f4ebc6337cb9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 15120180 3c0e8d9f3df47a5588618bdd0c0529f9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 2720230 12790a80072f9691a6aebfae99d2884a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 224370 288b4255fa05983bedd12c2787159713
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 223320 b0895780411c7883d4e662f59a614c09
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 219366 d2c62fcc31fe84998ff3ec7192adcaa9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 221098 14e8145058f41276743990373a602dc8
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 217728 ff9ec1441b3c486f2bf699aa34cd19cf
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 12559818 d106cb6e039594f39c69757139e3b81d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 13251680 6885825a1d87f69e2b9a8733bcd3149a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 13213584 78a23e516db62160e02d7531fdf56ceb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 13211806 626ac3ecedbc13b34fa972842eddc87e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb
Size/MD5 checksum: 13188560 cd0f63a5cb74c21d601ffaf22230015d
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 140430 3f2b9eba956c9d736df02ee8f8048960
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 152842 d79caea6f9eb14dc29f060f4c402623c
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 155756 92824520277f5805f4315f59bdae29ba
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 159776 bfa56474c228de3f2225b01d555628cd
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 148882 bd479694e49548e272b99d651525211c
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 154512 2f4ca0b5a6d15d372810a4adf28db0a2
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 158304 4baf71cc92212d7ac2cacb5913ce15bd
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 147580 741b00a1dd08f0a3ec11807b5b5e0d21
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 164966 3608c1954937b7c2a562c5e7cec9c82a
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 168700 f4292765662e2f76d9a2e18af8052122
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 163394 cde18e20701333deb222482a6bacd7ab
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb
Size/MD5 checksum: 167226 488d6c27c43fe4e6b39d3c2d8ee54be9
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb
Size/MD5 checksum: 59506 783e00471ba34c7961a962bd92800dc6
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb
Size/MD5 checksum: 68052 d71c7488bbe557ff73cecfb40866454c
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb
Size/MD5 checksum: 68288 572be41d7cd81949fe08696bcf44bd50
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb
Size/MD5 checksum: 66456 fc41d56657d638be30dbe7030ed30744
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb
Size/MD5 checksum: 66896 ab693dc48e540eb2b7c902e5bb3f5bb0

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5014 b5eb10541045f43a896cff6863fabc99
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5080 bef129992a5a0e02811924d9e2c20928
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5036 6013655c76a27afb60a5596344063fac
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5102 07d70aca348f010c1768a8f36f35d969
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 3097204 e62aa5944fb5f84f77a822b10dfaaec3
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 198498 7ce7e79e3a4a819907957fcf099a5c70
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 198092 75130dae14a72f13a096ea69c4af4f64
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 198210 013fd74c791f3529c082844d464e52bb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 197804 68e2bbb8cf37ce358688fe8bc59d23d2
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5010 f7d0ba9bd59a484ed8faa294f678b9cb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5074 c2c04705ec9f041555b60157dde8dfa9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5034 5c00d1be7ba6cc5adb92a249a955fd33
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 5102 b54e60d375f6e7ca263662d812175a5d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 21473296 d5ba65d7f15dcb9e8978af52cd78af19
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 22127598 56977e01aedd74201e249aa2dfb9d867
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 21391968 45b8ed70f88d2b5a32acb7664084972f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb
Size/MD5 checksum: 22153416 86f73fcd2c8c7b38cd6f3bd62c19bd43

HP Precision architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 1980 76a590df604e48b09ac92e97722e9b2b
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 1994 e52a21fa353ec696fab8a7540e23cee0
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 2068 b5572d57a20cced0a4a021bc3aeca59e
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 2000 332fb79b811586f1fdd543ec1a58fc0f
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 2066 ee4df56b5af375e3a77114b58cb7c355
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 1990 974297ab2e66bc6e45265027a9cab1cc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 2062 b9cfcd2358379c5712991999117ed580
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 1992 205b6094359187c7398018e138ed19a0
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb
Size/MD5 checksum: 2052 afb79e0c218abf65b5bd8e5d754cdb38
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 2800462 f91eaebb158c9749c1d31dc383b6e0f8
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 209530 b50da9513e91589182390342683fdb8e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 208622 ae7c1f319e17331a213d7b4ce7d16989
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 208182 c0462524e02dd0c6a27541a27e459c29
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 207748 b02991119d8ccca8b9e4c31737ab695d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 16023554 815f08d56c68ac50dcdb521e14390b7d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 16927964 7b4d90cbd15ddf98609cf72d3e512660
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 17476404 963d93e651086f54efb1375234957921
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb
Size/MD5 checksum: 18305586 db6058c84e2f63cfe2611674114f354d

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 3305946 8ef4160b024945d31d8744b14e32f25a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 3101536 3382c3e69f2fe998f0e671e8e270807d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 3011458 838d87ada5760307e762f1f3ec2c91f0
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 2986606 dcc8faa142a07efc35cfbcef3744406b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 3173820 c83822fd5935e4ceb7816dcede3c7b9a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 2977534 b3449977e75ade201f49e27a44f79c1b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 3046552 3694c7d1338e55cac77168122f5c4b38
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 3105060 86f7a2f92ae27dd3f8b57e9aebf1b118
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge2_m68k.deb
Size/MD5 checksum: 2991336 3a28774631beb37997d937e55a6e9454

PowerPC architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers_102sarge1_powerpc.deb
Size/MD5 checksum: 2380 fe4724ab347b4ac3332beba5e5ccfed4
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb
Size/MD5 checksum: 2396 6a2e8db727f0022e81255a442c5ebdc9
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb
Size/MD5 checksum: 2396 5eb96b2b98c92b52e6f932ab475b0fec
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb
Size/MD5 checksum: 2466 1d2424589e684946a5d6c7913db61976
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2514 2be237bec7e6d2878e75fc47a0222b9d
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb
Size/MD5 checksum: 2414 dbd3d270955b623ad805839960aa96ae
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2442 e1b15674c71cec89a5a2e4d70461baac
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb
Size/MD5 checksum: 2438 a3b87f2ef01a823a715ff69ee2ec8406
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2476 06957c6d5d9d86c9e5551275974fc18d
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb
Size/MD5 checksum: 2466 60dc23b47e8c98fa7426197c1770fdb2
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2516 e08eb266e65cb83bf5dfd85c230bb48e
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3_102sarge1_powerpc.deb
Size/MD5 checksum: 2400 d0a3883e658b675bef039514d5d317b9
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2422 e98c826345fc55bf1b4f261f0403001c
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4_102sarge1_powerpc.deb
Size/MD5 checksum: 2430 6838fb393d4ea7233a0db354ca8e0d6f
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2468 516df5d7055341135ca824e2c7ba4c59
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb
Size/MD5 checksum: 2440 84b8e93ae95a9a332835e459ae258c31
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb
Size/MD5 checksum: 2492 7bf7d3f281580247978af66b6bc71a9f
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 405208 bc0049d16d62333a59496f8448c0ae5b
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 405122 857956fab5ea958d1f0e29d9b8082074
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 405120 f1d48b84ce88a36f9a250228f77b24bf
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 405040 5aa69dd9407911e00cbd9bb1896f27b8
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 405410 9f24a2e7ea0609f7ca18dc78496a400e
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 405182 1c4270a6157a596aae2fb49c41a008ee
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 5145112 c45a74745d3359da81add15933eb847a
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 13537930 b88fc7f255a362ff1af0f127c105fe21
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 13895234 1c6a336420e8af2d40962f6016104cab
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 13526632 ad1bc642f915effd59fd6c2c646ed848
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 13883038 8afe1d42e0e03a81a55b108acd3a972d
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 13558318 71034f429cb959413adcc9f7df642d30
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb
Size/MD5 checksum: 13811714 79d63ee21fbcc4d343f73a391c2de350
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
http://security.debian.org/


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/dsa_1017_1_new_linux_kernel_268_packages_fix_several_vulnerabilities.html)