Home / vulnerabilitiesPDF  

dsa-1237-1.txt

Posted on 20 December 2006
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1237-1 security@debian.org
http://www.debian.org/security/ Dann Frazier
December 17th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : kernel-source-2.4.27
Vulnerability : several
Problem-Type : local/remote
Debian-specific: no
CVE ID : CVE-2006-4093 CVE-2006-4538 CVE-2006-4997 CVE-2006-5174
CVE-2006-5649 CVE-2006-5871


Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2005-4093

Olof Johansson reported a local DoS (Denial of Service) vulnerability
on the PPC970 platform. Unpriveleged users can hang the system by
executing the "attn" instruction, which was not being disabled at boot.

CVE-2006-4538

Kirill Korotaev reported a local DoS (Denial of Service) vulnerability
on the ia64 and sparc architectures. A user could cause the system to
crash by executing a malformed ELF binary due to insufficient verification
of the memory layout.

CVE-2006-4997

ADLab Venustech Info Ltd reported a potential remote DoS (Denial of
Service) vulnerability in the IP over ATM subsystem. A remote system
could cause the system to crash by sending specially crafted packets
that would trigger an attempt to free an already-freed pointer
resulting in a system crash.

CVE-2006-5174

Martin Schwidefsky reported a potential leak of sensitive information
on s390 systems. The copy_from_user function did not clear the remaining
bytes of the kernel buffer after receiving a fault on the userspace
address, resulting in a leak of uninitialized kernel memory. A local user
could exploit this by appending to a file from a bad address.

CVE-2006-5649

Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service)
vulnerability on powerpc systems. The alignment exception only
checked the exception table for -EFAULT, not for other errors. This can
be exploited by a local user to cause a system crash (panic).

CVE-2006-5871

Bill Allombert reported that various mount options are ignored by smbfs
when UNIX extensions are enabled. This includes the uid, gid and mode
options. Client systems would silently use the server-provided settings
instead of honoring these options, changing the security model. This
update includes a fix from Haroldo Gamal that forces the kernel to honor
these mount options. Note that, since the current versions of smbmount
always pass values for these options to the kernel, it is not currently
possible to activate unix extensions by omitting mount options. However,
this behavior is currently consistent with the current behavior of the
next Debian release, 'etch'.

The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

Debian 3.1 (sarge)
Source 2.4.27-10sarge5
Alpha architecture 2.4.27-10sarge5
ARM architecture 2.4.27-2sarge5
Intel IA-32 architecture 2.4.27-10sarge5
Intel IA-64 architecture 2.4.27-10sarge5
Motorola 680x0 architecture 2.4.27-3sarge5
Big endian MIPS 2.4.27-10.sarge4.040815-2
Little endian MIPS 2.4.27-10.sarge4.040815-2
PowerPC architecture 2.4.27-10sarge5
IBM S/390 architecture 2.4.27-2sarge5
Sun Sparc architecture 2.4.27-9sarge5

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

Debian 3.1 (sarge)
fai-kernels 1.9.1sarge5
kernel-image-2.4.27-speakup 2.4.27-1.1sarge4
mindi-kernel 2.4.27-2sarge4
systemimager 3.2.3-6sarge4

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge5.dsc
Size/MD5 checksum: 831 b970d762bf162cdfc8df32549bbdd566
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge5.tar.gz
Size/MD5 checksum: 32299 1007b0e6ba417ea12969e495056b2d5e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge5.dsc
Size/MD5 checksum: 840 381052d0f0e53b867b8190d9bf0e0d1b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge5.tar.gz
Size/MD5 checksum: 34450 4fe66843eb3dde9636a292726b0720ca
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge5.dsc
Size/MD5 checksum: 1581 f670c9495d1e6b3fc0dae34079be2703
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge5.tar.gz
Size/MD5 checksum: 99762 689742b819b03635be81e56f236f015b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge5.dsc
Size/MD5 checksum: 1143 aa5d275cbb5e611a430558c75d2ddce6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge5.tar.gz
Size/MD5 checksum: 55593 e8517a3876c679cf01ccdbdaf666c4fd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge5.dsc
Size/MD5 checksum: 876 7416f4d8d7d4d468977f966d6cb680da
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge5.tar.gz
Size/MD5 checksum: 12864 5d32bbaecfcef58ac406939346922caa
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge5.dsc
Size/MD5 checksum: 1074 cf00f7439b32b998ac35cf9bc0ba17ce
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge5.tar.gz
Size/MD5 checksum: 24784 bb76d31c4e97594546a1ce46205627be
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge5.dsc
Size/MD5 checksum: 832 61fe3968d2b8e2a0ae27d86bdadd82dd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge5.tar.gz
Size/MD5 checksum: 10570 982fd40704097c18838e3954de9d946e
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge4.dsc
Size/MD5 checksum: 732 ea5120c744a0c6680bd77bc262018e6d
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge4.tar.gz
Size/MD5 checksum: 18921 f898a597de3f981b99848160f092f06e
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-2.dsc
Size/MD5 checksum: 1051 007ebb5db36532e0bef9462411d7a25b
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-2.tar.gz
Size/MD5 checksum: 309221 e9154cdadd12cf9d3042fc3c69906796
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.dsc
Size/MD5 checksum: 1131 6b22f4ecad2ce3d2404d606c77da9dc7
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.tar.gz
Size/MD5 checksum: 1464751 d1891087138beef4e77784e3b29230b5
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge5.dsc
Size/MD5 checksum: 900 6b7eaed1211e79eeb7822c470588dc10
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge5.diff.gz
Size/MD5 checksum: 755526 437a36887a3730d49c6681e163085c91
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge4.dsc
Size/MD5 checksum: 750 49de53f3e66da5396a7c447411eda404
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge4.diff.gz
Size/MD5 checksum: 5089 400dd7c2ce12ba55e876cb90a035095f
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301


Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge5_all.deb
Size/MD5 checksum: 3581076 e1bbfffc57dbdfd0b9cd2d0a66a7744b
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge5_all.deb
Size/MD5 checksum: 710724 9535988810d9c8f3f4019720bd49a30b
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge5_all.deb
Size/MD5 checksum: 31034148 28894dd804436675aedfc296a8ee4d63
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge5_all.deb
Size/MD5 checksum: 27696 90eb280799013da95a3c1188e8b84d50
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge4_all.deb
Size/MD5 checksum: 2420804 1a05dca524994806146a6900efa71899


Alpha architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb
Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge5_alpha.deb
Size/MD5 checksum: 8074 4f676244465a1b8492343ffc27de9b7b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb
Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge5_alpha.deb
Size/MD5 checksum: 4574778 a40c45730f344deb8cfcc1d1a7ad2488
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge5_alpha.deb
Size/MD5 checksum: 273276 95820aca7779957cdc5b380de2241a4d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge5_alpha.deb
Size/MD5 checksum: 275206 01567b6608388db6ecbea1a4cfa5a99f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge5_alpha.deb
Size/MD5 checksum: 16531732 f6b0507544d219740e11894d49906179
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge5_alpha.deb
Size/MD5 checksum: 16983616 735c022a0d097f46a03348fe91a6e7ac
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_alpha.deb
Size/MD5 checksum: 20480 505188720fcfed347602c30bb1cd5f6c


ARM architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 483596 fe85544eabe959ce72f05dda8d65185a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 4726650 4729ca286f8e2314f6c5cdfaefbe93aa
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 1695008 4beae00e1c3e83463a772fe17aebc80f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 1059362 ee2f850805f19c7fdfdb8c866566cc56
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 7376966 26755e712c14e0003b0d599ccc1bac98
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 3165708 f673a41f1403e7a85e9cdbfc6cffb23b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge5_arm.deb
Size/MD5 checksum: 3687138 022d79de206311aa2364e5449915a94d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_arm.deb
Size/MD5 checksum: 18868 b0530590361123733515d0cd21bb01c9



Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 10534 c2e539824425af065b4617aa3589b782
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 1825394 6ca7de755e3890e989cfaa2271a0ba3d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 299390 5973792d7e12022780b7d4d51e1f2372
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 300664 948a088ae36738d5de11375009a162b6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 300562 620f476d04bfe3a906b9110d9495f902
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 302114 14db999e3504855ab0239341e41b8d0d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 299548 6b842b2221e6afa94332d6e2e434f5e2
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 300286 483ea0ad7316d1c82e1d667d8826d536
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 302128 d5f9b05985e032d4ce522283566b0fdd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 11052302 255d69882c14e9a92cf951b2fff9263f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 12036374 f576550eacb4d17f1388b89ce9615f06
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 12355204 cd85e4ca2b25cecddd0077b4eb47a0ce
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 12695118 31480c61a3ac3c71d4a1b9703b8d8139
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 11723728 3e4e06b330cd1ac479769baac326df7b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 12098618 541559dcbaa99bbd02642fe31b063ffd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 12434342 5813dbe009eea4141a872752874f0335
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 269980 77410fc804084d2169ceb1319a9e690f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 294862 b6270e45a1acfc537b6d9ba474e163d7
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 300698 939c08139e1e17f754d9d676ca3f9c04
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 306442 507f4d8c295e1c4549b06ded67009b98
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 288692 900499f7b356261f9859d051c96a54e8
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 294624 64620786d42099ead5e5bdb829f7c573
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb
Size/MD5 checksum: 299512 6a06f4d16650536bdcd1dd7f44851a3d
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
Size/MD5 checksum: 4773910 8c3955d4fa6d3af721c7d820a2e9d5a1
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb
Size/MD5 checksum: 11308946 ac2eca7ddc6e0fcfa0b7d835b28d3c41
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_i386.deb
Size/MD5 checksum: 16632 bab2d60567d5858c019407cca58d6688
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge4_i386.deb
Size/MD5 checksum: 7775346 31814a4d66ec8053772ad147a4a62b26


Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 7486 b40d48a972ee0cb277b63a649e0d01f2
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 4689752 b5ef21aee13412359cdb7fb5e039de74
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 242570 3dbd1ce3bbfed1c7c4aeb3de2396cf77
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 243234 14ed081560b4008f6e391b325b39544f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 242366 4acf18300727b24afe4f223623e5c44d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 243558 f48e9a34ea714966024f24277293d1d6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 7262 4cc86fa5dd7f157ab7fa3747f9ac8573
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 7274 7b6dec36049b6f277b72c2c6a24dd538
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 7290 00cf535d95cb5a827d53219de9d2b0a1
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 7302 093e0825e05675fd728a7db694531f1a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 16677620 d997c6d47e3592b0ab8c82917548102b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 17037020 75b4b47d8ebd8cd91327cfeaf76dd0d9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 16630570 11c5c2ea12f3cab5865b225f765d71c0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
Size/MD5 checksum: 16988538 f8b022aa39e91bccc24ab3adaab2c7aa
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_ia64.deb
Size/MD5 checksum: 22224 a4d38a63b6bd0399aa84d50d23f09cf6


Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2642370 64f44bc3e9c3313cb7aecf789ddb51de
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2545710 6dcdfedd3356d0f20e7899da7a7ff2bd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2396790 5d278c185e1ca1d34e65dc657cbcbe96
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2478704 181df694d051555f0253ff27e9f0863c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2326206 033f694ed1a6acc24efb07ecdbbe125c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2397324 f716f0313d88c62779569712078ae0c8
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge5_m68k.deb
Size/MD5 checksum: 2262406 c0c6fbb7a1160688f8e8c7ae97d43e9a
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_m68k.deb
Size/MD5 checksum: 16338 f9b14151760944376dfbbbfc47b73346


IBM S/390 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb
Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge5_s390.deb
Size/MD5 checksum: 4579864 fc815cfb54bdfed711c2c09fae740500
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb
Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb
Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb
Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge5_s390.deb
Size/MD5 checksum: 2782140 11029023c05ea13dc51206e74bdb2391
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge5_s390.deb
Size/MD5 checksum: 995678 a642f56da45718fe0a665ad1836f6112
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge5_s390.deb
Size/MD5 checksum: 2974550 749696ce8a74c220819579cb14ebff3a
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_s390.deb
Size/MD5 checksum: 19338 c86219a43c645a82ee1782d94dc6dce8


Sun Sparc architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 10550 164dc9869ea386fd3169864645d89a98
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 2025304 c036f26f3bb2c1a7f1acc7588b54c389
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 164532 18adb86c0d3ce5b6424b277ce2e39794
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 166318 d3fa63eab9ddab3f6b5db8f385ffe458
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 202940 c03ec973495d21f03df3f156c3dc033b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 204266 547fb57dd64584ee765c427d2c0554fd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 3605072 14ac1e3ce17cbf64bfd7a61f520cf494
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 3792788 38ef858c0ff9158cf44590782f5664e0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 6385736 5dfaf6a6a6e5a809a38458ef79661d3b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge5_sparc.deb
Size/MD5 checksum: 6550182 97b6ef3ce231c448687bf357daae4faf
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_sparc.deb
Size/MD5 checksum: 18200 1465507e83184c1c32b2015530dc39c9


AMD64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_amd64.deb
Size/MD5 checksum: 17252 8c0ddf9b2b2c5f7ac695d7f10af7aeb5


HP Precision architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_hppa.deb
Size/MD5 checksum: 19334 22608a5cbf78b9dfb49a91685513485e


Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-2_mips.deb
Size/MD5 checksum: 4681544 e5ad300c16978417dfdb04a55b3cf505
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-2_mips.deb
Size/MD5 checksum: 3854770 6fb17fc57af59997c55dc5d15fe86324
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-2_mips.deb
Size/MD5 checksum: 3857642 135e1590f21c14db5765422dadd03571
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-2_mips.deb
Size/MD5 checksum: 7186300 c841f01587ec79fc411bda056d663a04
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_mips.deb
Size/MD5 checksum: 20448 02fd1e80e83a5c3e7b6b16832b77cc26


Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 4686676 eb7e81b8a3a6829252a02251aed92b08
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 3037974 ea0208a51612c1e34a6aa60410d21c3d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 2999656 ec0c25c38b5e7a8a65142bbc52b8220d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 4107630 deefd96c7f6b2e3e954c98284d367e61
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 2141986 e3ea6afd27d393fcdf6b20a755fa7a41
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 7048130 dd624bc0af5d1e39be9084a58ad575d5
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 4677566 6179a00efde69e2bef158f584b667bc9
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_mipsel.deb
Size/MD5 checksum: 20488 41476ba7fba16f7453c72fad3ac7279a


PowerPC architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 143604 dbd3e6559ab4d24640e78fa5096b8d4d
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 143402 0ac835db06b6feb1b662ffe7cee6b1ca
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 157358 df24d8751cee33c2ec3490fe3c58aab5
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 157652 f95e05ad17a85a314f36ad794231bd19
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 157408 19f3fa73f641f93a734b5a0c1d92800a
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 4684386 33f89f6ff68d4697590dc56da8f5c85b
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 4694600 0d7e24209c0c22ad726ddc7d2046f5e4
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 4802248 dc4bb7170432243f61d1ccf10820518f
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 2502696 794593451ab3047561014f148290650c
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 1819296 026d70d2989c1f5345280777f8430d33
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 13486360 c02196059ed6f7103d6faa2a45320828
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 12759400 e9108a2f987765ff915435b199bda15e
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 13792416 3af28a8ab21e298043311c0e15b19184
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 65868 b0f73596dd19e6c41d0fa64f5c3d7e22
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 11006 c537fc249b24e8d4c57165e6f4d6ad5a
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
Size/MD5 checksum: 10928 11f29b35752d4f50ea28b345001efb2b
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-2_powerpc.deb
Size/MD5 checksum: 18902 a8338f398511cd07bd619b812f18d76b

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFhU8VXm3vHE4uyloRAqyaAJoCjTG8pCP4OuaLqSRiqr2F/TIh0QCg0oNv
cX7kv9vIm6CBHm4dJqv7whM=
=e1p5
-----END PGP SIGNATURE-----

 

TOP