<<< Date Index >>>     <<< Thread Index >>>

[SECURITY] [DSA 1017-1] New Linux kernel 2.6.8 packages fix several vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1017-1                    security@xxxxxxxxxx
http://www.debian.org/security/                 Dann Frazier, Simon Horman
March 23th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.6.8
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 
CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 
CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 
CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 
CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 
CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 
CVE-2006-1066
Debian Bug     : 295949 334113 330287 332587 332596 330343 330353 327416

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2004-1017

    Multiple overflows exist in the io_edgeport driver which might be usable
    as a denial of service attack vector.

CVE-2005-0124

    Bryan Fulton reported a bounds checking bug in the coda_pioctl function
    which may allow local users to execute arbitrary code or trigger a denial
    of service attack.

CVE-2005-0449
    
    An error in the skb_checksum_help() function from the netfilter framework
    has been discovered that allows the bypass of packet filter rules or
    a denial of service attack.

CVE-2005-2457

    Tim Yamin discovered that insufficient input validation in the zisofs driver
    for compressed ISO file systems allows a denial of service attack through
    maliciously crafted ISO images.

CVE-2005-2490

    A buffer overflow in the sendmsg() function allows local users to execute
    arbitrary code.

CVE-2005-2555

    Herbert Xu discovered that the setsockopt() function was not restricted to
    users/processes with the CAP_NET_ADMIN capability. This allows attackers to
    manipulate IPSEC policies or initiate a denial of service attack. 

CVE-2005-2709

    Al Viro discovered a race condition in the /proc handling of network 
devices.
    A (local) attacker could exploit the stale reference after interface 
shutdown
    to cause a denial of service or possibly execute code in kernel mode.

CVE-2005-2800

    Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices
    leak memory, which allows a denial of service attack.

CVE-2005-2973
 
    Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 
code
    can be forced into an endless loop, which allows a denial of service attack.

CVE-2005-3044

    Vasiliy Averin discovered that the reference counters from sockfd_put() and 
    fput() can be forced into overlapping, which allows a denial of service 
attack
    through a null pointer dereference.

CVE-2005-3053

    Eric Dumazet discovered that the set_mempolicy() system call accepts a 
negative
    value for it's first argument, which triggers a BUG() assert. This allows a
    denial of service attack.

CVE-2005-3055

    Harald Welte discovered that if a process issues a USB Request Block (URB)
    to a device and terminates before the URB completes, a stale pointer
    would be dereferenced.  This could be used to trigger a denial of service
    attack.

CVE-2005-3180

    Pavel Roskin discovered that the driver for Orinoco wireless cards clears
    it's buffers insufficiently. This could leak sensitive information into
    user space.

CVE-2005-3181

    Robert Derr discovered that the audit subsystem uses an incorrect function 
to
    free memory, which allows a denial of service attack.

CVE-2005-3257

    Rudolf Polzer discovered that the kernel improperly restricts access to the
    KDSKBSENT ioctl, which can possibly lead to privilege escalation.

CVE-2005-3356

    Doug Chapman discovered that the mq_open syscall can be tricked into
    decrementing an internal counter twice, which allows a denial of service 
attack
    through a kernel panic.

CVE-2005-3358

    Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()
    system call leads to a kernel panic, which allows a denial of service 
attack.

CVE-2005-3783

    The ptrace code using CLONE_THREAD didn't use the thread group ID to
    determine whether the caller is attaching to itself, which allows a denial
    of service attack.

CVE-2005-3784

    The auto-reaping of childe processes functionality included ptraced-attached
    processes, which allows denial of service through dangling references.

CVE-2005-3806

    Yen Zheng discovered that the IPv6 flow label code modified an incorrect 
variable,
    which could lead to memory corruption and denial of service.

CVE-2005-3847

    It was discovered that a threaded real-time process, which is currently 
dumping
    core can be forced into a dead-lock situation by sending it a SIGKILL 
signal,
    which allows a denial of service attack. 

CVE-2005-3848

    Ollie Wild discovered a memory leak in the icmp_push_reply() function, which
    allows denial of service through memory consumption.

CVE-2005-3857

    Chris Wright discovered that excessive allocation of broken file lock leases
    in the VFS layer can exhaust memory and fill up the system logging, which 
allows
    denial of service.

CVE-2005-3858

    Patrick McHardy discovered a memory leak in the ip6_input_finish() function 
from
    the IPv6 code, which allows denial of service.

CVE-2005-4605

    Karl Janmar discovered that a signedness error in the procfs code can be 
exploited
    to read kernel memory, which may disclose sensitive information.

CVE-2005-4618

    Yi Ying discovered that sysctl does not properly enforce the size of a 
buffer, which
    allows a denial of service attack.

CVE-2006-0095

    Stefan Rompf discovered that dm_crypt does not clear an internal struct 
before freeing
    it, which might disclose sensitive information.

CVE-2006-0096

    It was discovered that the SDLA driver's capability checks were too lax
    for firmware upgrades.

CVE-2006-0482

    Ludovic Courtes discovered that get_compat_timespec() performs insufficient 
input
    sanitizing, which allows a local denial of service attack.

CVE-2006-1066

    It was discovered that ptrace() on the ia64 architecture allows a local 
denial of
    service attack, when preemption is enabled.


The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.6.8-16sarge2
     Alpha architecture          2.6.8-16sarge2
     AMD64 architecture          2.6.8-16sarge2
     HP Precision architecture   2.6.8-6sarge2
     Intel IA-32 architecture    2.6.8-16sarge2
     Intel IA-64 architecture    2.6.8-14sarge2
     Motorola 680x0 architecture 2.6.8-4sarge2
     PowerPC architecture        2.6.8-12sarge2
     IBM S/390 architecture      2.6.8-5sarge2
     Sun Sparc architecture      2.6.8-15sarge2

The following matrix lists additional packages that were rebuilt for
compatability with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     kernel-latest-2.6-alpha     101sarge1
     kernel-latest-2.6-amd64     103sarge1
     kernel-latest-2.6-hppa      2.6.8-1sarge1
     kernel-latest-2.6-sparc     101sarge1
     kernel-latest-2.6-i386      101sarge1
     kernel-latest-powerpc       102sarge1
     fai-kernels                 1.9.1sarge1
     hostap-modules-i386         0.3.7-1sarge1
     mol-modules-2.6.8           0.9.70+2.6.8+12sarge1
     ndiswrapper-modules-i386    1.1-2sarge1

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

This update introduces a change in the kernel's binary interface, the affected
kernel packages inside Debian have been rebuilt, if you're running local addons
you'll need to rebuild these as well.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc
      Size/MD5 checksum:      874 a35d48f0d5b6c679b5130fb3aaa647cb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz
      Size/MD5 checksum:    14256 7c44e2e875b7995f5bb14effb5684b7d
    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc
      Size/MD5 checksum:     1004 f98203872db1017d6053ababb496116d
    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz
      Size/MD5 checksum:  1015096 0bb501098f732e6750e3413f4e9d148f
    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
      Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc
      Size/MD5 checksum:      896 caa3c2d1f06666c61ba31917a3c26b1f
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz
      Size/MD5 checksum:     2396 d71945b6f493574ce0d360de316f1873
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc
      Size/MD5 checksum:      685 54417bc7eddc5722e0f5ce734e67edb9
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz
      Size/MD5 checksum:     1954 1cdaccf68580892b42cd88b5c5b03b9b
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc
      Size/MD5 checksum:      786 e99a3432c467f4f76e9b6e852333a9c5
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz
      Size/MD5 checksum:     2123 d90ea9aa1ccb9ad3041d5d3b20894330
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc
      Size/MD5 checksum:      813 e860fc8f679fdedb3817d09e25c77b66
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz
      Size/MD5 checksum:     2055 3fb20a5238ac6dc6a84ba67a887d752e
    
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc
      Size/MD5 checksum:      621 c8d489fa28bd6b65bd3bda1a460d8a08
    
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz
      Size/MD5 checksum:    24387 25e9d10a881601e9329291faf5110b55
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc
      Size/MD5 checksum:      993 6cd9024b61b9a6cf4862e204d330b9a3
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz
      Size/MD5 checksum:     2661 d7bf35beb4924d8dab10b08380e9e289
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc
      Size/MD5 checksum:      862 9d55e1790bcc518f315b44a52ed331bc
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz
      Size/MD5 checksum:     2286 1e9932ed547a85a43b82c10ac9b11800
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc
      Size/MD5 checksum:     1047 8fa892195f50896a45f4a2c64f66ce11
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz
      Size/MD5 checksum:    89240 5987c1e4d49bb7b3159f3a42b22d1e4f
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc
      Size/MD5 checksum:     1008 9c8bbaf47e657e4ac707c6f35cee0f2e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz
      Size/MD5 checksum:    65886 0f42b0e9fc22cd2d5eb615d8f4f6922d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc
      Size/MD5 checksum:     1103 df823aaf30d2d39f51762abf0fdab8e4
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz
      Size/MD5 checksum:    74018 415ea9bd8c15a343646a762c7ecbeb2c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc
      Size/MD5 checksum:      812 3689bf78b872510caeaeaefe3a76b477
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz
      Size/MD5 checksum:    37429 69216b4fe13afb383e5559e4100439ff
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc
      Size/MD5 checksum:     1071 f1d5f3c6a58c3b2efbecb6f481bc6e13
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz
      Size/MD5 checksum:    25410 78cd732eb81df1bae3f513eb68aa95c0
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc
      Size/MD5 checksum:     1191 8a58beb88416f8235e0ccf91b94bda5e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz
      Size/MD5 checksum:    62533 d3a0fd97437e9eb69f07b5297246610b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc
      Size/MD5 checksum:      833 aa306a38d5cf9f45e601633d239f868e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz
      Size/MD5 checksum:    11437 2c70d8408f9656fba114ee59f22cb44b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc
      Size/MD5 checksum:     1036 b2db64932de00311794a14eaded25ec3
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz
      Size/MD5 checksum:    22798 9d94f73ab654770fc251125e1332b2be
    
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc
      Size/MD5 checksum:      703 f5c46506673becb263a62307591041b9
    
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz
      Size/MD5 checksum:     4326 f6191f77c2f41e397e47b727b30d1f64
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc
      Size/MD5 checksum:     1092 926d84df8f84a7c9cc68add4fee27427
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz
      Size/MD5 checksum:     2273 896ab1f6cbb18b1afd092845b8e12523
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc
      Size/MD5 checksum:      894 97a270d1e39bfd032314dc3171831846
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz
      Size/MD5 checksum:     1782 1c5a70ee63b83630319152768b924a98

  Alpha architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb
      Size/MD5 checksum:     1980 0f1542a109fbe036fb8af44e20397299
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb
      Size/MD5 checksum:     1980 d75c152fdab411ad8184ba6331015dcd
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb
      Size/MD5 checksum:     1980 69be478f2fa35a994c02a4f3b450a60e
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb
      Size/MD5 checksum:     1990 3ca05863dcaa11c43c0c7d4c29e4ddfd
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:  2757876 e94cdb8d12552d293018c7ca24199f47
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   230608 fdf2cc6f010f2b618672422c3293f3b9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   225502 2a21bf8197792a789420b1838526186f
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb
      Size/MD5 checksum:  2758214 0ecffff87c9a03f6f19147c61a5fc48b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb
      Size/MD5 checksum:   230730 3b29ce53073ac08216153a5d6e4b629e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb
      Size/MD5 checksum:   225634 316c8d48a8a59da90707fb03e2149bc0
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb
      Size/MD5 checksum: 20218454 9d8030373efb6dc3e2dfded09cf5c0d5
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb
      Size/MD5 checksum: 20068918 710fee78a9ffbde5694b71af50e0060c

  AMD64 architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
      Size/MD5 checksum:     2104 ef0b887f5fbe7a50eb29b9f758f4dbe7
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
      Size/MD5 checksum:     2112 99fc45919e4e99c75b9c9caa96892684
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
      Size/MD5 checksum:     2110 56ce795b6f72a01261f554d7f80e17f7
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
      Size/MD5 checksum:     2126 687cd2d07a2216bd06b3e7167c34429a
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
      Size/MD5 checksum:     2122 80b347bd1c3b75ba8e6019eb4515131d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb
      Size/MD5 checksum:     2158 593b2f6857005238309652f1ed07b025
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb
      Size/MD5 checksum:     2166 c195509461a3829a88149ecb25dbcd3a
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb
      Size/MD5 checksum:     2172 d87ecb48ff4c9706e28bee9b5e523f0d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb
      Size/MD5 checksum:     2218 28145de5465f3149b0fb7182c07e2dbb
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb
      Size/MD5 checksum:     2248 a709d2651b5bc6f16a46e482513ffd7c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum:  2719948 51945c8ba3e5d86f81df067f73225201
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum:   224276 33205d1399f5df2dce3583f737fb528a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum:   223300 bb55484a26b5a9a3fc01b68af37af569
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum:   219178 010a7d13b9c5546006b736caddcfb1b9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum:   221054 c3674ad6b1c88ae5aa1c36c732fe1fe0
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum:   217440 22ab9501c6422fd3b160e27bf7a59d2d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum:  2720186 0db767733816d0a1d4a5e9840348532b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum:   224506 7b32141a97738499376939faf694b031
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum:   223506 3461e58701032b00a0340f931af02325
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum:   219164 e3841dd8bc0d6a326a2b186a2febe880
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum:   221058 aa43b631e5516324f5e357a50bf03919
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum:   217500 181e3fa415a02835b62dc538562650bb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
      Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum: 12560178 13c61c6f63e666a2da9d35e9b4b829b3
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum: 13251702 4a87624ae820a7fef519660321ccd002
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum: 13213610 6f574e36cbe1c9adbac496968998d389
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum: 13061358 d9bdb5fdcd2ca14594b4c4eeb0ec4e95
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb
      Size/MD5 checksum: 13044562 61005d327a9ea9efed46625e79710689

  Intel IA-32 architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb
      Size/MD5 checksum:     2106 fcb23b2830bed29439b86f0174bc36b0
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb
      Size/MD5 checksum:     2126 4261e8ea28972c4b1a0328491c142e9d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb
      Size/MD5 checksum:     2114 3a59ea468ed72766258d4c6d4ca721d9
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb
      Size/MD5 checksum:     2134 bfbd467ce5c19e5e1909beb867da57c6
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb
      Size/MD5 checksum:     2130 8c3cb8de73fecb230bf869dce2e92e9b
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb
      Size/MD5 checksum:     2160 3fdac05d7afc2d522191b8672310e3bb
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb
      Size/MD5 checksum:     2168 78248b7c5024afdd3e8bcf8f3b85fdd0
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb
      Size/MD5 checksum:     2180 33dbe8a50cd2deb102b2c26c3451cb0d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb
      Size/MD5 checksum:     2228 8f87a7c45040d6192c7dd7521719bb84
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb
      Size/MD5 checksum:     2250 0220661e0e1c24c0248a54ed13f93e96
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb
      Size/MD5 checksum:     2150 f710e37e9e5af100ef65b167020739ca
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb
      Size/MD5 checksum:     2184 0dcabd1f69fe86bb1d431f193d032a5d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb
      Size/MD5 checksum:     2248 88dbce576e5ec5b484085f0e7f204b1c
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb
      Size/MD5 checksum:     2160 459222cd722e8c592fef62a5e64d2e29
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb
      Size/MD5 checksum:     2228 a528e1e7db01a3280a2bab86383f8f9e
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb
      Size/MD5 checksum:     2152 64f8938c4ccf9a567ace8906474a3a05
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb
      Size/MD5 checksum:     2182 3fc7225f53712469830cb60404598287
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb
      Size/MD5 checksum:     2252 97cc65172e9583cf0299c68e53b2dbc3
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb
      Size/MD5 checksum:     2164 cbd1dd8a0dc39c35598c131e0473ce46
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb
      Size/MD5 checksum:     2232 5a55c3acad554351348c2c4bbe9347b9
    
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb
      Size/MD5 checksum: 11986970 3f1f1b972c9aea7e324d3f16252c1a14
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:  2777236 af649947c652a9486461b92bbc33be8a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   256920 88db1b684f215fdd35de0989f148b57f
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254646 553205bb17cfc57f4c4a7aadff46650a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251590 51ebd6202b7f347f66df0e189b2a3946
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254818 746967059979238eb49cfdcba572c07b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251708 33a61355c7a48d87b7570b772e454760
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:  2777384 1bb1a12e5057dff0213af9d62e204e1a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   256932 4ffede1559073c0fac6256ebf6bf0fa2
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   254820 e24193f1e1a4e0f19e4f6dea078b94a3
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   251726 9afbac1038d98e6377a02ff6aebb3441
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   254918 e32f308990db81bff7295a4724dfa23a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   251742 c4ad3e4f52e907067a44f25214b6b34f
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 14064090 7801ebccc8aaa6cbdf94b8f97c017f17
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 15534482 11587d9502f913721dde8c98fef3b676
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 15343922 cc4689243c7fc2134bb4b6e89e44668a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 15260668 839c21112982d20f38b3f4ebc6337cb9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 15120180 3c0e8d9f3df47a5588618bdd0c0529f9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:  2719920 0984a4d0f8de19308e49bc822b2d7c71
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   224274 4faa8c6ee4aceae2ea01a2398c433599
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   223264 298ec2bb85e50e58b4e0ba131648e1b2
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   219174 d7422d17926f1e654627e08a71a8da94
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   220996 0433d7f8f2ce52acde87fd1518b1987c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   217432 f34fb2bc6f9986cc94b002385392ff98
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:  2720230 12790a80072f9691a6aebfae99d2884a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   224370 288b4255fa05983bedd12c2787159713
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   223320 b0895780411c7883d4e662f59a614c09
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   219366 d2c62fcc31fe84998ff3ec7192adcaa9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   221098 14e8145058f41276743990373a602dc8
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum:   217728 ff9ec1441b3c486f2bf699aa34cd19cf
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 12559818 d106cb6e039594f39c69757139e3b81d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 13251680 6885825a1d87f69e2b9a8733bcd3149a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 13213584 78a23e516db62160e02d7531fdf56ceb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 13211806 626ac3ecedbc13b34fa972842eddc87e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb
      Size/MD5 checksum: 13188560 cd0f63a5cb74c21d601ffaf22230015d
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   140430 3f2b9eba956c9d736df02ee8f8048960
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   152842 d79caea6f9eb14dc29f060f4c402623c
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   155756 92824520277f5805f4315f59bdae29ba
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   159776 bfa56474c228de3f2225b01d555628cd
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   148882 bd479694e49548e272b99d651525211c
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   154512 2f4ca0b5a6d15d372810a4adf28db0a2
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   158304 4baf71cc92212d7ac2cacb5913ce15bd
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   147580 741b00a1dd08f0a3ec11807b5b5e0d21
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   164966 3608c1954937b7c2a562c5e7cec9c82a
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   168700 f4292765662e2f76d9a2e18af8052122
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   163394 cde18e20701333deb222482a6bacd7ab
    
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb
      Size/MD5 checksum:   167226 488d6c27c43fe4e6b39d3c2d8ee54be9
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb
      Size/MD5 checksum:    59506 783e00471ba34c7961a962bd92800dc6
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb
      Size/MD5 checksum:    68052 d71c7488bbe557ff73cecfb40866454c
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb
      Size/MD5 checksum:    68288 572be41d7cd81949fe08696bcf44bd50
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb
      Size/MD5 checksum:    66456 fc41d56657d638be30dbe7030ed30744
    
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb
      Size/MD5 checksum:    66896 ab693dc48e540eb2b7c902e5bb3f5bb0

  Intel IA-64 architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5014 b5eb10541045f43a896cff6863fabc99
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5080 bef129992a5a0e02811924d9e2c20928
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5036 6013655c76a27afb60a5596344063fac
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5102 07d70aca348f010c1768a8f36f35d969
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:  3097054 691f7cd4d1b2f184e50ab566f20a13e4
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198662 72e0e4b4331b8a600de3a98d6ac59a82
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197920 6e19efeac81a2a9416328af58316c4cb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198394 6d946fcc7b1fcf88c9ee9a47f7015384
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197828 8be7e8290bd8e7cf1b9c162c9e369b36
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:  3097204 e62aa5944fb5f84f77a822b10dfaaec3
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:   198498 7ce7e79e3a4a819907957fcf099a5c70
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:   198092 75130dae14a72f13a096ea69c4af4f64
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:   198210 013fd74c791f3529c082844d464e52bb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:   197804 68e2bbb8cf37ce358688fe8bc59d23d2
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5010 f7d0ba9bd59a484ed8faa294f678b9cb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5074 c2c04705ec9f041555b60157dde8dfa9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5034 5c00d1be7ba6cc5adb92a249a955fd33
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum:     5102 b54e60d375f6e7ca263662d812175a5d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum: 21473296 d5ba65d7f15dcb9e8978af52cd78af19
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum: 22127598 56977e01aedd74201e249aa2dfb9d867
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum: 21391968 45b8ed70f88d2b5a32acb7664084972f
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb
      Size/MD5 checksum: 22153416 86f73fcd2c8c7b38cd6f3bd62c19bd43

  HP Precision architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     1980 76a590df604e48b09ac92e97722e9b2b
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     1994 e52a21fa353ec696fab8a7540e23cee0
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     2068 b5572d57a20cced0a4a021bc3aeca59e
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     2000 332fb79b811586f1fdd543ec1a58fc0f
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     2066 ee4df56b5af375e3a77114b58cb7c355
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     1990 974297ab2e66bc6e45265027a9cab1cc
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     2062 b9cfcd2358379c5712991999117ed580
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     1992 205b6094359187c7398018e138ed19a0
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb
      Size/MD5 checksum:     2052 afb79e0c218abf65b5bd8e5d754cdb38
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:  2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   209500 8b284495343adf74bca8219421f4b48d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208722 941a680674931ec594e3512c5736c9bf
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208356 7ab2df2b04391d75500083585a96701b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   207502 0a840281a00f4762978af411d7a3e7fb
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum:  2800462 f91eaebb158c9749c1d31dc383b6e0f8
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum:   209530 b50da9513e91589182390342683fdb8e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum:   208622 ae7c1f319e17331a213d7b4ce7d16989
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum:   208182 c0462524e02dd0c6a27541a27e459c29
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum:   207748 b02991119d8ccca8b9e4c31737ab695d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum: 16023554 815f08d56c68ac50dcdb521e14390b7d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum: 16927964 7b4d90cbd15ddf98609cf72d3e512660
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum: 17476404 963d93e651086f54efb1375234957921
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb
      Size/MD5 checksum: 18305586 db6058c84e2f63cfe2611674114f354d

  Motorola 680x0 architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  3305946 8ef4160b024945d31d8744b14e32f25a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  3101536 3382c3e69f2fe998f0e671e8e270807d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  3011458 838d87ada5760307e762f1f3ec2c91f0
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  2986606 dcc8faa142a07efc35cfbcef3744406b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  3173820 c83822fd5935e4ceb7816dcede3c7b9a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  2977534 b3449977e75ade201f49e27a44f79c1b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  3046552 3694c7d1338e55cac77168122f5c4b38
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  3105060 86f7a2f92ae27dd3f8b57e9aebf1b118
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge2_m68k.deb
      Size/MD5 checksum:  2991336 3a28774631beb37997d937e55a6e9454

  PowerPC architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers_102sarge1_powerpc.deb
      Size/MD5 checksum:     2380 fe4724ab347b4ac3332beba5e5ccfed4
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb
      Size/MD5 checksum:     2396 6a2e8db727f0022e81255a442c5ebdc9
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb
      Size/MD5 checksum:     2396 5eb96b2b98c92b52e6f932ab475b0fec
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb
      Size/MD5 checksum:     2466 1d2424589e684946a5d6c7913db61976
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2514 2be237bec7e6d2878e75fc47a0222b9d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb
      Size/MD5 checksum:     2414 dbd3d270955b623ad805839960aa96ae
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2442 e1b15674c71cec89a5a2e4d70461baac
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb
      Size/MD5 checksum:     2438 a3b87f2ef01a823a715ff69ee2ec8406
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2476 06957c6d5d9d86c9e5551275974fc18d
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb
      Size/MD5 checksum:     2466 60dc23b47e8c98fa7426197c1770fdb2
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2516 e08eb266e65cb83bf5dfd85c230bb48e
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3_102sarge1_powerpc.deb
      Size/MD5 checksum:     2400 d0a3883e658b675bef039514d5d317b9
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2422 e98c826345fc55bf1b4f261f0403001c
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4_102sarge1_powerpc.deb
      Size/MD5 checksum:     2430 6838fb393d4ea7233a0db354ca8e0d6f
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2468 516df5d7055341135ca824e2c7ba4c59
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb
      Size/MD5 checksum:     2440 84b8e93ae95a9a332835e459ae258c31
    
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb
      Size/MD5 checksum:     2492 7bf7d3f281580247978af66b6bc71a9f
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:   405208 bc0049d16d62333a59496f8448c0ae5b
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:   405122 857956fab5ea958d1f0e29d9b8082074
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:   405120 f1d48b84ce88a36f9a250228f77b24bf
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:   405040 5aa69dd9407911e00cbd9bb1896f27b8
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:   405410 9f24a2e7ea0609f7ca18dc78496a400e
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:   405182 1c4270a6157a596aae2fb49c41a008ee
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405670 bd347754ea8c4cee14686b207e6cf46d
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405666 1dec752373178a4aef51f74c6d917073
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405598 c39f371744ca92eec853ad8746f0f009
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405568 b346b94897fca3c678daadc99b515428
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405912 14475ec4cdc9b337ad2dc0ab3a772bdb
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405698 4c3c94aa9afb4e6d73986bbfa26484bb
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:  5143830 3a6cd285eba77baae74a2a16f8029be2
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum:  5145112 c45a74745d3359da81add15933eb847a
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum: 13537930 b88fc7f255a362ff1af0f127c105fe21
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum: 13895234 1c6a336420e8af2d40962f6016104cab
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum: 13526632 ad1bc642f915effd59fd6c2c646ed848
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum: 13883038 8afe1d42e0e03a81a55b108acd3a972d
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum: 13558318 71034f429cb959413adcc9f7df642d30
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb
      Size/MD5 checksum: 13811714 79d63ee21fbcc4d343f73a391c2de350
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab
    
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca
    
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc_0.9.70+2.6.8+12sarge1_powerpc.deb
      Size/MD5 checksum:    38380 361eb34e717c3996b1b1118cac92da32
    
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc-smp_0.9.70+2.6.8+12sarge1_powerpc.deb
      Size/MD5 checksum:    39310 1c19f5fcbd866c83d6386ed643d08afa

  IBM S/390 architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  5083010 42c4dd8c6c67ce7940f0d24bb745385c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge2_s390.deb
      Size/MD5 checksum:  5084018 855029ce8570fc938826289ba375098b
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  2973758 c8d12dd2fbddca3ab1b7bd905de4a90c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  1140118 328edfc2944127e2f1d6dca1842ce51d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  3179326 487c36323990a6ae1119f4c30f16cdd9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge2_s390.deb
      Size/MD5 checksum:  2976012 d807ca6328f0f789b5f8dfff07d29db0
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge2_s390.deb
      Size/MD5 checksum:  1140596 32f51209baa4d72d8ccf6d5ed57f4638
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge2_s390.deb
      Size/MD5 checksum:  3182684 fb892f14401c5cb0bc11a1f16a40a6fa

  Sun Sparc architecture:

    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc32_101sarge1_sparc.deb
      Size/MD5 checksum:     2094 ee7137ee7a7aaa37d5b0e34983d22ca5
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64_101sarge1_sparc.deb
      Size/MD5 checksum:     2098 1f028cdda7b37f42a9c93712a2af9cac
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb
      Size/MD5 checksum:     2106 c7539f2b30142c5e549e03e54a40ba35
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc32_101sarge1_sparc.deb
      Size/MD5 checksum:     2070 3ea5f8502192782ebfba70500eeb7eab
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64_101sarge1_sparc.deb
      Size/MD5 checksum:     2072 d3966357806c24f79e9d4e858dedd635
    
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64-smp_101sarge1_sparc.deb
      Size/MD5 checksum:     2090 b2872959f522478d84039d84eebf4e4e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:     3462 c68f0624f124db25f3a41f78432ca11c
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:     3516 e01d50a416f25627da8d7cf5282b0b4e
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  2888690 29723527245a48a00e724c7366868ec9
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   107974 788d40ca3a1a3f53b8b2cf4c1fc4badc
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   142726 8719b1bf0d3aff36f7711d8979f87a7d
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   143332 87bc055c575e3ec3ea44136ed44dff6a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:  2889160 058d5bbc4b91691fa87204302c7b1a8a
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:   108198 d802239f368827f5cd139f3b8d5b9458
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:   142976 6e0c64f83cc5cb9342c0f65b61a62a30
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:   143640 f6ba9cf8f830e9e9f2c6297d35a2bc57
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  4545570 00d7c7e1caef41efcbc198a282f2b9f2
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7428184 1f146c58f98331bf5826520379bacd33
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7622116 4de4c114879d82d79fc34cb93c070d43
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:  4547790 9cc8acb2d0a3e490dc3ae2ef8fc0f139
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:  7431432 af5c99841ee5dcaa8fed642a89653f52
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb
      Size/MD5 checksum:  7625246 2e40c6079591a28656a280f4e8d5f344

  Architecture independent components:

    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge2_all.deb
      Size/MD5 checksum:  6181586 52e464ad87d3d29f61211c3a20232459
    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb
      Size/MD5 checksum:  1043588 4451df70d7b6df9b00ad788712959db3
    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2_all.deb
      Size/MD5 checksum: 34936164 826e6dc98eed9696f9070afd83a72559
    
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge2_all.deb
      Size/MD5 checksum:    33842 28717b85541e3aa8aa872f61798d23fc
    
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge2_all.deb
      Size/MD5 checksum:     9244 3ba83cf4618348710094dbccbec1b0bb


  These files will probably be moved into the stable distribution on
  its next update.

- 
---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEIxmEXm3vHE4uyloRAqIhAKCQiFS3MoU0wx4nt5YIyD5Ks8jYZgCfUBgM
DYCwn3apmlZ+I4nnQD7qZXU=
=7Ln0
-----END PGP SIGNATURE-----