CVE-2006-0038
CVSS6.9
发布时间 :2006-03-22 15:06:00
修订时间 :2011-03-07 21:29:12
NMCOPS    

[原文]Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function.


[CNNVD]Linux Kernel Netfilter do_replace函数远程溢出漏洞(CNNVD-200603-376)

        Linux是开放源码操作系统Linux所使用的内核。
        Linux的netfilter模块实现上存在漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。
        Linux的netfilter模块中do_replace()函数在SMP_ALIGN()中相加或与NR_CPUS相乘时可能导致copy_from_user()出现溢出。相加的溢出在所有系统上都可以触发,而相乘的溢出可能需要更多的物理内存。这些溢出都可以覆盖任意数量的Kernel内存,导致执行任意指令。

- CVSS (基础分值)

CVSS分值: 6.9 [中等(MEDIUM)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-189 [数值错误]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.0:test2Linux Kernel 2.6 test2
cpe:/o:linux:linux_kernel:2.6.12.2Linux Kernel 2.6.12.2
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.11:rc2Linux Kernel 2.6.11 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13.3Linux Kernel 2.6.13.3
cpe:/o:linux:linux_kernel:2.6.15:rc3Linux Kernel 2.6.15 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.15.1Linux Kernel 2.6.15.1
cpe:/o:linux:linux_kernel:2.6.14:rc4Linux Kernel 2.6.14 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.0:test9Linux Kernel 2.6 test9
cpe:/o:linux:linux_kernel:2.6.11.6Linux Kernel 2.6.11.6
cpe:/o:linux:linux_kernel:2.6.0:test5Linux Kernel 2.6 test5
cpe:/o:linux:linux_kernel:2.6.13.2Linux Kernel 2.6.13.2
cpe:/o:linux:linux_kernel:2.6.14:rc3Linux Kernel 2.6.14 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.11:rc3Linux Kernel 2.6.11 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.0:test1Linux Kernel 2.6 test1
cpe:/o:linux:linux_kernel:2.6.11:rc4Linux Kernel 2.6.11 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.14.2Linux Kernel 2.6.14.2
cpe:/o:linux:linux_kernel:2.6.15:rc2Linux Kernel 2.6.15 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.16:rc1Linux Kernel 2.6.16 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.14:rc1Linux Kernel 2.6.14 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0:test11Linux Kernel 2.6 test11
cpe:/o:linux:linux_kernel:2.6.13:rc1Linux Kernel 2.6.13 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.9:2.6.20
cpe:/o:linux:linux_kernel:2.6.0:test7Linux Kernel 2.6 test7
cpe:/o:linux:linux_kernel:2.6.13.1Linux Kernel 2.6.13.1
cpe:/o:linux:linux_kernel:2.6.0:test6Linux Kernel 2.6 test6
cpe:/o:linux:linux_kernel:2.6.12:rc5Linux Kernel 2.6.12 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.13:rc7Linux Kernel 2.6.13 Release Candidate 7
cpe:/o:linux:linux_kernel:2.6.12.5Linux Kernel 2.6.12.5
cpe:/o:linux:linux_kernel:2.6.15Linux Kernel 2.6.15
cpe:/o:linux:linux_kernel:2.6.15.5Linux Kernel 2.6.15.5
cpe:/o:linux:linux_kernel:2.6.15.3Linux Kernel 2.6.15.3
cpe:/o:linux:linux_kernel:2.6.13.4Linux Kernel 2.6.13.4
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.13:rc4Linux Kernel 2.6.13 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.15:rc1Linux Kernel 2.6.15 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.14.5Linux Kernel 2.6.14.5
cpe:/o:linux:linux_kernel:2.6.12.6Linux Kernel 2.6.12.6
cpe:/o:linux:linux_kernel:2.6.12:rc4Linux Kernel 2.6.12 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.12.4Linux Kernel 2.6.12.4
cpe:/o:linux:linux_kernel:2.6_test9_cvs
cpe:/o:linux:linux_kernel:2.6.14:rc2Linux Kernel 2.6.14 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.8Linux Kernel 2.6.11.8
cpe:/o:linux:linux_kernel:2.6.12.1Linux Kernel 2.6.12.1
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.13Linux Kernel 2.6.13
cpe:/o:linux:linux_kernel:2.6.8:rc3Linux Kernel 2.6.8 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.8:rc2Linux Kernel 2.6.8 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.11.5Linux Kernel 2.6.11.5
cpe:/o:linux:linux_kernel:2.6.10:rc2Linux Kernel 2.6.10 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.12:rc1Linux Kernel 2.6.12 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.14.4Linux Kernel 2.6.14.4
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.15.4Linux Kernel 2.6.15.4
cpe:/o:linux:linux_kernel:2.6.0:test4Linux Kernel 2.6 test4
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.6.8:rc1Linux Kernel 2.6.8 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.11Linux Kernel 2.6.11.11
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.12.3Linux Kernel 2.6.12.3
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.11.7Linux Kernel 2.6.11.7
cpe:/o:linux:linux_kernel:2.6.11.12Linux Kernel 2.6.11.12
cpe:/o:linux:linux_kernel:2.6.15.2Linux Kernel 2.6.15.2
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.0:test8Linux Kernel 2.6 test8
cpe:/o:linux:linux_kernel:2.6.14Linux Kernel 2.6.14
cpe:/o:linux:linux_kernel:2.6.0:test3Linux Kernel 2.6 test3
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.0:test10Linux Kernel 2.6 test10
cpe:/o:linux:linux_kernel:2.6.14.1Linux Kernel 2.6.14.1
cpe:/o:linux:linux_kernel:2.6.14.3Linux Kernel 2.6.14.3
cpe:/o:linux:linux_kernel:2.6.13:rc6Linux Kernel 2.6.13 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10945Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0038
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0038
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-376
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/17178
(PATCH)  BID  17178
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=186295
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=186295
http://xforce.iss.net/xforce/xfdb/25400
(UNKNOWN)  XF  linux-netfilter-doreplace-overflow(25400)
http://www.vupen.com/english/advisories/2006/2554
(UNKNOWN)  VUPEN  ADV-2006-2554
http://www.vupen.com/english/advisories/2006/1046
(UNKNOWN)  VUPEN  ADV-2006-1046
http://www.ubuntu.com/usn/usn-302-1
(UNKNOWN)  UBUNTU  USN-302-1
http://www.redhat.com/support/errata/RHSA-2006-0575.html
(UNKNOWN)  REDHAT  RHSA-2006:0575
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ee4bb818ae35f68d1f848eae0a7b150a38eb4168
(UNKNOWN)  CONFIRM  http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ee4bb818ae35f68d1f848eae0a7b150a38eb4168
http://www.debian.org/security/2006/dsa-1103
(UNKNOWN)  DEBIAN  DSA-1103
http://www.debian.org/security/2006/dsa-1097
(UNKNOWN)  DEBIAN  DSA-1097
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://secunia.com/advisories/22417
(UNKNOWN)  SECUNIA  22417
http://secunia.com/advisories/21465
(UNKNOWN)  SECUNIA  21465
http://secunia.com/advisories/20914
(UNKNOWN)  SECUNIA  20914
http://secunia.com/advisories/20716
(UNKNOWN)  SECUNIA  20716
http://secunia.com/advisories/20671
(UNKNOWN)  SECUNIA  20671
http://secunia.com/advisories/19330
(UNKNOWN)  SECUNIA  19330

- 漏洞信息

Linux Kernel Netfilter do_replace函数远程溢出漏洞
中危 缓冲区溢出
2006-03-22 00:00:00 2006-03-23 00:00:00
本地  
        Linux是开放源码操作系统Linux所使用的内核。
        Linux的netfilter模块实现上存在漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。
        Linux的netfilter模块中do_replace()函数在SMP_ALIGN()中相加或与NR_CPUS相乘时可能导致copy_from_user()出现溢出。相加的溢出在所有系统上都可以触发,而相乘的溢出可能需要更多的物理内存。这些溢出都可以覆盖任意数量的Kernel内存,导致执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Linux linux-2.6.16.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.tar.bz2

- 漏洞信息 (F47794)

Debian Linux Security Advisory 1103-1 (PacketStormID:F47794)
2006-06-27 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2005-3359,CVE-2006-0038,CVE-2006-0039,CVE-2006-0456,CVE-2006-0554,CVE-2006-0555,CVE-2006-0557,CVE-2006-0558,CVE-2006-0741,CVE-2006-0742,CVE-2006-0744,CVE-2006-1056,CVE-2006-1242,CVE-2006-1368,CVE-2006-1523,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857
[点击下载]

Debian Security Advisory 1103-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1103-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 27th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.6.8
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2005-3359 CVE-2006-0038 CVE-2006-0039 CVE-2006-0456
                 CVE-2006-0554 CVE-2006-0555 CVE-2006-0557 CVE-2006-0558
                 CVE-2006-0741 CVE-2006-0742 CVE-2006-0744 CVE-2006-1056
                 CVE-2006-1242 CVE-2006-1368 CVE-2006-1523 CVE-2006-1524
                 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 CVE-2006-1863
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2005-3359

    Franz Filz discovered that some socket calls permit causing inconsistent
    reference counts on loadable modules, which allows local users to cause
    a denial of service.
    
CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of kernel
    memory by exploiting a race condition. Likewise, it requires CAP_NET_ADMIN
    privileges. 

CVE-2006-0456

    David Howells discovered that the s390 assembly version of the
    strnlen_user() function incorrectly returns some string size values.

CVE-2006-0554

    It was discovered that the ftruncate() function of XFS can expose
    unallocated, which allows information disclosure of previously deleted
    files.

CVE-2006-0555

    It was discovered that some NFS file operations on handles mounted with
    O_DIRECT can force the kernel into a crash.

CVE-2006-0557

    It was discovered that the code to configure memory policies allows
    tricking the kernel into a crash, thus allowing denial of service.

CVE-2006-0558

    It was discovered by Cliff Wickman that perfmon for the IA64
    architecture allows users to trigger a BUG() assert, which allows
    denial of service.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad elf entry
    address.

CVE-2006-0742

    Alan and Gareth discovered that the ia64 platform had an
    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-0744

    The Linux kernel did not properly handle uncanonical return
    addresses on Intel EM64T CPUs, reporting exceptions in the SYSRET
    instead of the next instruction, causing the kernel exception
    handler to run on the user stack with the wrong GS. This may result
    in a DoS due to a local user changing the frames.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1523

    Oleg Nesterov reported an unsafe BUG_ON call in signal.c which was
    introduced by RCU signal handling. The BUG_ON code is protected by
    siglock while the code in switch_exit_pids() uses tasklist_lock. It
    may be possible for local users to exploit this to initiate a denial
    of service attack (DoS).

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1863

    Mark Mosely discovered that chroots residing on an CIFS share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.


The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.6.8-16sarge3
     Alpha architecture          2.6.8-16sarge3
     HP Precision architecture   2.6.8-6sarge3
     Intel IA-32 architecture    2.6.8-16sarge3
     Intel IA-64 architecture    2.6.8-14sarge3
     Motorola 680x0 architecture 2.6.8-4sarge3
     PowerPC architecture        2.6.8-12sarge3
     IBM S/390 architecture      2.6.8-5sarge3
     Sun Sparc architecture      2.6.8-15sarge3

Due to technical problems the built amd64 packages couldn't be processed
by the archive script. Once this problem is resolved, an updated DSA 1103-2
will be sent out with the checksums for amd64.

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3.dsc
      Size/MD5 checksum:     1002 c13d8ebcabab9477e9dbf7a5d66fa4d4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3.diff.gz
      Size/MD5 checksum:  1043822 9dc3ae088c90a7be470b9436ca317fcc
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
      Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge3.dsc
      Size/MD5 checksum:      812 822e18074a76927a0a91c83916c991bb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge3.tar.gz
      Size/MD5 checksum:    39108 45f3b6b40470a81768f113160754fdbd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge3.dsc
      Size/MD5 checksum:     1008 6fa522a94872155497a0e057a05f8b61
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge3.tar.gz
      Size/MD5 checksum:    67361 863b56c6386182f58fda2054099e9e52
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge3.dsc
      Size/MD5 checksum:     1047 294c981159570b5253bc877ce0543b12
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge3.tar.gz
      Size/MD5 checksum:    90731 3215b0f2a0dc926db6e05b04ff5760ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge3.dsc
      Size/MD5 checksum:     1191 e26e2149236092d9227773a904eaed04
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge3.tar.gz
      Size/MD5 checksum:    64130 03de4cad1ccfa5ce38f5b4b97b71f5ad
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge3.dsc
      Size/MD5 checksum:      874 2e925606f9143b774ab2e86a12d62c44
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge3.tar.gz
      Size/MD5 checksum:    15464 7dfeb923284a92f3bca5e8ef62a52498
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge3.dsc
      Size/MD5 checksum:     1071 9e2657e0a79bd6b3cde0df2e5c9aa77e
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge3.tar.gz
      Size/MD5 checksum:    26926 5f6c84921c0f6041fdd269a6c66a0568
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge3.dsc
      Size/MD5 checksum:      846 89d3a1f59fb514c8c5a195e91eaa1997
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge3.tar.gz
      Size/MD5 checksum:    12972 e3c65e0b2998dad3c440a0c1af5cd99f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge3.dsc
      Size/MD5 checksum:     1036 31e7168c06b98e03789c100b6a6fcf67
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge3.tar.gz
      Size/MD5 checksum:    24369 6c9e2b0e3a3f625cc4103b385f0c093c


  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:  6184022 54432fcfa3a56c502b0feabe6723c467
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:  1079878 a2ca885ba3b9b30d211c26647524cbc9
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum: 34941458 74c1b17e994280ac14d7116a52b771bf
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:    35082 7b08d82ec9046359cd85ea87aad96995
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge3_all.deb
      Size/MD5 checksum:    10934 0d1c81689deeaa145be9e4d3ae140a81


  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:  2757876 e94cdb8d12552d293018c7ca24199f47
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   230608 fdf2cc6f010f2b618672422c3293f3b9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   225502 2a21bf8197792a789420b1838526186f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:  2759828 544e1f44b4cebfaf97f4ae1870b56ab1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:   232152 9ba670970518572ad7db755e7888ee8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:   227100 a836d721852b11fa6422f33dc81a5415
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum: 20220874 d9c1642300f72cc5f3fc3b04865b3b3d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum: 20073352 1faa9472c15dd6142221fec2261b5628


  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:  2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   209500 8b284495343adf74bca8219421f4b48d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208722 941a680674931ec594e3512c5736c9bf
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208356 7ab2df2b04391d75500083585a96701b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   207502 0a840281a00f4762978af411d7a3e7fb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:  2802244 f82eaa9411813bbdee2e0c268a067c81
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   211350 c221830c715cfebb1acb383d8f7c6a8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   210570 96c096a16a6291f4b40716ac939bd063
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   210220 fc6c20856e898e4bd881711e6392d4e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   209468 6a00248dcf25809f02f7ab585429f27b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 16029232 665d462c1fae45714ff948289c8a3457
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 16927312 a69c9e976ab6810bf7043a15daa1dd29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 17480298 66e35e40e7e2d82370f7ccba7544a59a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 18306822 88ade3c07fc414c82bf589def0bda600


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:  2777236 af649947c652a9486461b92bbc33be8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   256920 88db1b684f215fdd35de0989f148b57f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254646 553205bb17cfc57f4c4a7aadff46650a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251590 51ebd6202b7f347f66df0e189b2a3946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254818 746967059979238eb49cfdcba572c07b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251708 33a61355c7a48d87b7570b772e454760
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:  2779348 210a335431d029842eb82036d5326edf
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   258446 1d48b727a22487e4b34f4894b2a9a7f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   256322 8f73439c2a920c66ae05d3ceba45229a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   253564 4ce8f253c15562e9d11a985e135d94b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   256504 5a5c2acd3ef2fb3764489ed77865739e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   253486 48f046411662bdde50195f8bdb421efa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 14063774 13d8810b179bb8408645e7fab57d114a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15536484 0a47b2f9fc33d4b7a52eb68b54419c82
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15346402 fffd9fb96343167ccc32356fa307152a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15261026 cbdee84292a612fddca022377e38eebb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15124168 248b85e7c59930aeb63fda6a0366b9a2


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6606 27049d0c329dc1cad092b2d53c3322ec
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6678 f3967dddbec5691733d49246d09f8cb3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6638 acc1b57c5a246304f9cee279574811e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6706 5c28f912ecc42291a9ec3ef0f13c6041
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:  3097054 691f7cd4d1b2f184e50ab566f20a13e4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198662 72e0e4b4331b8a600de3a98d6ac59a82
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197920 6e19efeac81a2a9416328af58316c4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198394 6d946fcc7b1fcf88c9ee9a47f7015384
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197828 8be7e8290bd8e7cf1b9c162c9e369b36
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:  3098862 aee4e1b99a34047fbf47941e2dced300
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199934 484af4636ad4d64ecbf89dd7b47cda03
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199302 8b6e3253f9c04054e1e9d2066e4323c0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199582 8b97de7837305ad8728bc0ab4bfeccb1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199190 508601b56facbca5211e2e3f1a819d4e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6602 dea61776e4279d8906f3d552af3ed55c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6670 d8ab34493a8cfc857dccd8a84743017a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6630 04e4d5b971ec3523b80a3f2373afbf73
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6700 f5cc48a00ca305eaea622738ce0d6570
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 21476428 ec3548487a558e67913419b84c84999c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 22133136 0d6292568fadcc40f65e87314315165c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 21408908 539197e6af86ff9583cf43d12ad109b1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 22154322 a4ae9740b9459b0a43c47b5b6e546515


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3305628 8029426256d755ea724ed7b46243c1ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3101728 677b103a57ce6de26b072245dfd585f7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3014324 f7a8e8b9c7d4eacecd1f1d69f1ee2c34
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2986734 fd1f14cc2856a55bb6948bdf956ea0d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3173334 e32fa0fd9460b9e19bd24c8cc413684f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2978518 6e682497437fa9d1912ea5fd3374c82f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3047534 f9daecf9203da30c95cd9ab9647d8c54
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3108200 9a81b37d60bdcf95d6cbc3ca5eb83d1a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2992046 cfae06d516a2695eb961e574570661a4


  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   407330 3025ba5c61db0cd42b9d0ab1a3e01b1c
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406624 21742d40c3c0bac0d64e970c0944c59f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406548 b9ce59161b3faf818f77239a468828e4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406518 e40256427db90a027ed2be8a7b50997c
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406882 c899bf1d81895ee43306a8b19e3c8ee8
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   407320 45108a12629a9eddd40b071db4b92e4e
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405670 bd347754ea8c4cee14686b207e6cf46d
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405666 1dec752373178a4aef51f74c6d917073
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405598 c39f371744ca92eec853ad8746f0f009
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405568 b346b94897fca3c678daadc99b515428
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405912 14475ec4cdc9b337ad2dc0ab3a772bdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405698 4c3c94aa9afb4e6d73986bbfa26484bb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:  5143830 3a6cd285eba77baae74a2a16f8029be2
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:  5147620 32c5daf3656ab15416c3a42a5be21afc
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13577038 981f85ad155781610e2069f28b1eb4e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13929444 b11a91f117e0d25b6df7a56cd2c0f0d6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13560822 44f1276a6cd811646ebf3ccb2da06067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13920572 fd32c8d3f0dbb55430075b57546f9390
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13594454 93d70ceed88a16e7af0fe3db1a2c5baa
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13847204 5f22d24e351ce6040f9fa995e5a7906a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  5083010 42c4dd8c6c67ce7940f0d24bb745385c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  5087230 aa48eb8b2a3a5f215bba97329947a2eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  2973758 c8d12dd2fbddca3ab1b7bd905de4a90c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  1140118 328edfc2944127e2f1d6dca1842ce51d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  3179326 487c36323990a6ae1119f4c30f16cdd9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  2977844 c491248ed7d4c71415be782f7fbe77e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  1142366 fddcd4821b89cbf30f47d5df380f2961
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  3186726 3eaf46617bf0ee1de50cad55f351aa54


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:     3462 c68f0624f124db25f3a41f78432ca11c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:     5194 b90da0337cb607278aa01d4ec0c19a3a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  2888690 29723527245a48a00e724c7366868ec9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   107974 788d40ca3a1a3f53b8b2cf4c1fc4badc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   142726 8719b1bf0d3aff36f7711d8979f87a7d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   143332 87bc055c575e3ec3ea44136ed44dff6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  2890616 a3717a911c04df4af4917c5a0366a8de
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   109996 d42960c6242e6a62d5a2cb9809645bea
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   144710 f1c0a8b3bf641019d7831cc1277ba524
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   145366 505e40a256abd9fa04a49321fba69115
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  4545570 00d7c7e1caef41efcbc198a282f2b9f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7428184 1f146c58f98331bf5826520379bacd33
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7622116 4de4c114879d82d79fc34cb93c070d43
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  4550972 ea3ec35673aed896ec9416a8f470bf77
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  7431000 fab9d693f9c9642b67e0d386f3df01ee
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  7628010 8c922a4190017515210c6738213b0782


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEoLqvXm3vHE4uyloRAmpRAKCEL2aSzNg4NCC7a4MgkE3gUS3dkQCfc3Dy
h9XpOeylbvWZtXWsn03PS0o=
=twOb
-----END PGP SIGNATURE-----






_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F47620)

Ubuntu Security Notice 302-1 (PacketStormID:F47620)
2006-06-26 00:00:00
Ubuntu  ubuntu.com
advisory,kernel,vulnerability
linux,ubuntu
CVE-2006-0038,CVE-2006-0744,CVE-2006-1055,CVE-2006-1056,CVE-2006-1522,CVE-2006-1527,CVE-2006-1528,CVE-2006-1855,CVE-2006-1856,CVE-2006-1857,CVE-2006-1858,CVE-2006-1859,CVE-2006-1860,CVE-2006-1864,CVE-2006-2071,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Ubuntu Security Notice 302-1 - A ridiculous amount of vulnerabilities have been patched in the Linux 2.6 kernel series for Ubuntu.

=========================================================== 
Ubuntu Security Notice USN-302-1              June 15, 2006
linux-source-2.6.10/2.6.12/2.6.15 vulnerabilities
CVE-2006-0038, CVE-2006-0744, CVE-2006-1055, CVE-2006-1056,
CVE-2006-1522, CVE-2006-1527, CVE-2006-1528, CVE-2006-1855,
CVE-2006-1856, CVE-2006-1857, CVE-2006-1858, CVE-2006-1859,
CVE-2006-1860, CVE-2006-1864, CVE-2006-2071, CVE-2006-2271,
CVE-2006-2272, CVE-2006-2274, CVE-2006-2275, CVE-2006-2444
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  linux-image-2.6.10-6-386                          2.6.10-34.20
  linux-image-2.6.10-6-686                          2.6.10-34.20
  linux-image-2.6.10-6-686-smp                      2.6.10-34.20
  linux-image-2.6.10-6-amd64-generic                2.6.10-34.20
  linux-image-2.6.10-6-amd64-k8                     2.6.10-34.20
  linux-image-2.6.10-6-amd64-k8-smp                 2.6.10-34.20
  linux-image-2.6.10-6-amd64-xeon                   2.6.10-34.20
  linux-image-2.6.10-6-k7                           2.6.10-34.20
  linux-image-2.6.10-6-k7-smp                       2.6.10-34.20
  linux-image-2.6.10-6-power3                       2.6.10-34.20
  linux-image-2.6.10-6-power3-smp                   2.6.10-34.20
  linux-image-2.6.10-6-power4                       2.6.10-34.20
  linux-image-2.6.10-6-power4-smp                   2.6.10-34.20
  linux-image-2.6.10-6-powerpc                      2.6.10-34.20
  linux-image-2.6.10-6-powerpc-smp                  2.6.10-34.20
  linux-patch-ubuntu-2.6.10                         2.6.10-34.20
  linux-source-2.6.10                               2.6.10-34.20
  linux-tree-2.6.10                                 2.6.10-34.20

Ubuntu 5.10:
  linux-image-2.6.12-10-386                         2.6.12-10.34
  linux-image-2.6.12-10-686                         2.6.12-10.34
  linux-image-2.6.12-10-686-smp                     2.6.12-10.34
  linux-image-2.6.12-10-amd64-generic               2.6.12-10.34
  linux-image-2.6.12-10-amd64-k8                    2.6.12-10.34
  linux-image-2.6.12-10-amd64-k8-smp                2.6.12-10.34
  linux-image-2.6.12-10-amd64-xeon                  2.6.12-10.34
  linux-image-2.6.12-10-k7                          2.6.12-10.34
  linux-image-2.6.12-10-k7-smp                      2.6.12-10.34
  linux-image-2.6.12-10-powerpc                     2.6.12-10.34
  linux-image-2.6.12-10-powerpc-smp                 2.6.12-10.34
  linux-image-2.6.12-10-powerpc64-smp               2.6.12-10.34
  linux-patch-ubuntu-2.6.12                         2.6.12-10.34
  linux-source-2.6.12                               2.6.12-10.34
  linux-tree-2.6.12                                 2.6.12-10.34

Ubuntu 6.06 LTS:
  linux-image-2.6.15-25-386                         2.6.15-25.43
  linux-image-2.6.15-25-686                         2.6.15-25.43
  linux-image-2.6.15-25-amd64-generic               2.6.15-25.43
  linux-image-2.6.15-25-amd64-k8                    2.6.15-25.43
  linux-image-2.6.15-25-amd64-server                2.6.15-25.43
  linux-image-2.6.15-25-amd64-xeon                  2.6.15-25.43
  linux-image-2.6.15-25-k7                          2.6.15-25.43
  linux-image-2.6.15-25-powerpc                     2.6.15-25.43
  linux-image-2.6.15-25-powerpc-smp 2.              6.15-25.43
  linux-image-2.6.15-25-powerpc64-smp               2.6.15-25.43
  linux-image-2.6.15-25-server                      2.6.15-25.43
  linux-image-2.6.15-25-server-bigiron              2.6.15-25.43
  linux-source-2.6.15                               2.6.15-25.43
  avm-fritz-firmware                                2.6.15.23
  avm-fritz-firmware-2.6.15-25                      2.6.15.11-2
  avm-fritz-kernel-source                           2.6.15.11-2
  fglrx-control                                     2.6.15.11-2
  fglrx-kernel-source                               2.6.15.11-2
  xorg-driver-fglrx                                 2.6.15.11-2
  xorg-driver-fglrx-dev                             2.6.15.11-2
  nvidia-glx                                        2.6.15.11-2
  nvidia-glx-dev                                    2.6.15.11-2
  nvidia-glx-legacy                                 2.6.15.11-2
  nvidia-glx-legacy-dev                             2.6.15.11-2
  linux-restricted-modules-2.6.15-25-386            2.6.15.11-2
  linux-restricted-modules-2.6.15-25-686            2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-generic  2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-k8       2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-xeon     2.6.15.11-2
  linux-restricted-modules-2.6.15-25-k7             2.6.15.11-2
  linux-restricted-modules-2.6.15-25-powerpc        2.6.15.11-2
  linux-restricted-modules-2.6.15-25-powerpc-smp    2.6.15.11-2
  linux-restricted-modules-386                      2.6.15.23
  linux-restricted-modules-686                      2.6.15.23
  linux-restricted-modules-amd64-generic            2.6.15.23
  linux-restricted-modules-amd64-k8                 2.6.15.23
  linux-restricted-modules-amd64-xeon               2.6.15.23
  linux-restricted-modules-common                   2.6.15.11-2
  linux-restricted-modules-k7                       2.6.15.23
  linux-restricted-modules-powerpc                  2.6.15.23
  linux-restricted-modules-powerpc-smp              2.6.15.23
  linux-386                                         2.6.15.23
  linux-686                                         2.6.15.23
  linux-686-smp                                     2.6.15.23
  linux-k7                                          2.6.15.23
  linux-k7-smp                                      2.6.15.23
  linux-power3                                      2.6.15.23
  linux-power3-smp                                  2.6.15.23
  linux-power4                                      2.6.15.23
  linux-power4-smp                                  2.6.15.23
  linux-powerpc                                     2.6.15.23
  linux-powerpc-smp                                 2.6.15.23
  linux-powerpc64-smp                               2.6.15.23
  linux-amd64-generic                               2.6.15.23
  linux-amd64-k8                                    2.6.15.23
  linux-amd64-k8-smp                                2.6.15.23
  linux-amd64-server                                2.6.15.23
  linux-amd64-xeon                                  2.6.15.23
  linux-server                                      2.6.15.23
  linux-server-bigiron                              2.6.15.23
  linux-image-386                                   2.6.15.23
  linux-image-686                                   2.6.15.23
  linux-image-amd64-generic                         2.6.15.23
  linux-image-amd64-k8                              2.6.15.23
  linux-image-amd64-server                          2.6.15.23
  linux-image-amd64-xeon                            2.6.15.23
  linux-image-k7                                    2.6.15.23
  linux-image-power3                                2.6.15.23
  linux-image-power3-smp                            2.6.15.23
  linux-image-power4                                2.6.15.23
  linux-image-power4-smp                            2.6.15.23
  linux-image-powerpc                               2.6.15.23
  linux-image-powerpc-smp                           2.6.15.23
  linux-image-powerpc64-smp                         2.6.15.23
  linux-image-server                                2.6.15.23
  linux-image-server-bigiron                        2.6.15.23

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel
update has been given a new version number, which requires you to
recompile and reinstall all third party kernel modules you might have
installed. If you use linux-restricted-modules, you have to update
that package as well to get modules which work with the new kernel
version. Unless you manually uninstalled the standard kernel
metapackages (linux-386, linux-powerpc, linux-amd64-generic), a
standard system upgrade will automatically perform this as well.

Details follow:

An integer overflow was discovered in the do_replace() function. A
local user process with the CAP_NET_ADMIN capability could exploit
this to execute arbitrary commands with full root privileges.
However, none of Ubuntu's supported packages use this capability with
any non-root user, so this only affects you if you use some third
party software like the OpenVZ virtualization system. (CVE-2006-0038)

On EMT64 CPUs, the kernel did not properly handle uncanonical return
addresses. A local user could exploit this to trigger a kernel crash.
(CVE-2006-0744)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

Jan Beulich discovered an information leak in the handling of
registers for the numeric coprocessor when running on AMD processors.
This allowed processes to see the coprocessor execution state of
other processes, which could reveal sensitive data in the case of
cryptographic computations. (CVE-2006-1056)

Marcel Holtmann discovered that the sys_add_key() did not check that
a new user key is added to a proper keyring. By attempting to add a
key to a normal user key (which is not a keyring), a local attacker
could exploit this to crash the kernel. (CVE-2006-1522)

Ingo Molnar discovered that the SCTP protocol connection tracking
module in netfilter got stuck in an infinite loop on certain empty
packet chunks. A remote attacker could exploit this to cause the
computer to hang. (CVE-2006-1527)

The SCSI I/O driver did not correctly handle the VM_IO flag for memory
mapped pages used for data transfer. A local user could exploit this
to cause a kernel crash. (CVE-2006-1528)

The choose_new_parent() contained obsolete debugging code. A local
user could exploit this to cause a kernel crash. (CVE-2006-1855)

Kostik Belousov discovered that the readv() and writev() functions did
not query LSM modules for access permission. This could be exploited
to circumvent access restrictions defined by LSM modules such as
SELinux or AppArmor. (CVE-2006-1856)

The SCTP driver did not properly verify certain parameters when
receiving a HB-ACK chunk. By sending a specially crafted packet to an
SCTP socket, a remote attacker could exploit this to trigger a buffer
overflow, which could lead to a crash or possibly even arbitrary code
execution. (CVE-2006-1857)

The sctp_walk_params() function in the SCTP driver incorrectly used
rounded values for bounds checking instead of the precise values. By
sending a specially crafted packet to an SCTP socket, a remote
attacker could exploit this to crash the kernel. (CVE-2006-1858)

Bjoern Steinbrink reported a memory leak in the __setlease() function.
A local attacker could exploit this to exhaust kernel memory and
render the computer unusable (Denial of Service). (CVE-2006-1859)

Daniel Hokka Zakrisson discovered that the lease_init() did not
properly handle locking. A local attacker could exploit this to cause
a kernel deadlock (Denial of Service). (CVE-2006-1860)

Mark Moseley discovered that the CIFS file system driver did not
filter out "..\\" path components. A local attacker could exploit this
to break out of a chroot environment on a mounted SMB share.
(CVE-2006-1863) The same vulnerability applies to the older smb file
system. (CVE-2006-1864)

Hugh Dickins discovered that the mprotect() function allowed an user
to change a read-only shared memory attachment to become writable,
which bypasses IPC (inter-process communication) permissions.
(CVE-2006-2071)

The SCTP (Stream Control Transmission Protocol) driver triggered a
kernel panic on unexpected packets while the session was in the CLOSED
state, instead of silently ignoring the packets. A remote attacker
could exploit this to crash the computer. (CVE-2006-2271)

The SCTP driver did not handle control chunks if they arrived in
fragmented packets. By sending specially crafted packets to an SCTP
socket, a remote attacker could exploit this to crash the target
machine. (CVE-2006-2272)

The SCTP driver did not correctly handle packets containing more than
one DATA fragment. By sending specially crafted packets to an SCTP
socket, a remote attacker could exploit this to crash the target
machine. (CVE-2006-2274)

The SCTP driver did not correcly buffer incoming packets. By sending a
large number of small messages to a receiver application that cannot
process the messages quickly enough, a remote attacker could exploit
this to cause a deadlock in the target machine (Denial of Service).
(CVE-2006-2275)

Patrick McHardy discovered that the snmp_trap_decode() function did
not correctly handle memory allocation in some error conditions. By
sending specially crafted packets to a machine which uses the SNMP
network address translation (NAT), a remote attacker could exploit
this to crash that machine. (CVE-2006-2444)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20.diff.gz
      Size/MD5:  6119119 7c8e68b20e2b5772e11e86ef1f107378
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20.dsc
      Size/MD5:     2511 ed2776255bbc37d4ec28219bc666450e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.20_all.deb
      Size/MD5:  6780262 84c4f6e1c0f8be97a6663e662d00f94e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20_all.deb
      Size/MD5: 37515070 13f5a6bd597bd7cc26e7e7570241752f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.20_all.deb
      Size/MD5:   506344 e43866ad706b123ccb1f7887a3bfc77d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    20830 65039758c34a2b9803898d0f1577e31a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    47404 11ca50ec66cef3ff27e69bf5ddf5c09d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    88900 07a8b316cc28e767d57d5f3490d71cf7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    30022 64dd2350ae98f77f22c23417be29ed1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    41250 8202527668e86a9402a924c7e92fdf21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    73604 d2dc1615ad0e2b353cf60c6042860f9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     5740 060e8b24a3caeb9734f99cf15e0f5152
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    34858 0f1ec19756bf0a7ba2e016d4320c9c87
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    55186 9e502b339d5177ce631da3c018287a69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   112960 c3c0c8327e1ccfad7658c720376879fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    40822 19212c1693af337d6c46708d4d6ac3e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   115724 5b364365f7159780cc0aa3bc10a34f81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   174642 f71484abfe8ad8983c12918d4ed28a57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    82588 37375ba4e1c4aeb59ffa3106fdc58af6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:  1467824 9d3b04576eae7b5b10c2778d39b6c61d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-generic_2.6.10-34.20_amd64.deb
      Size/MD5:   287694 f2f80ea9d6a88534431cb7ec24fa0409
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8-smp_2.6.10-34.20_amd64.deb
      Size/MD5:   284634 0a06c99af6feb7ebbe92bdf2c7d4d38c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8_2.6.10-34.20_amd64.deb
      Size/MD5:   286712 3f7c598c4fa35817b97ed04ec158c77f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-xeon_2.6.10-34.20_amd64.deb
      Size/MD5:   282278 14e98f8869fe645838d6dde8960a9b40
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_amd64.deb
      Size/MD5:  6140598 040fdc36ca15c657879fb233e96babdd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-generic_2.6.10-34.20_amd64.deb
      Size/MD5: 14580658 b71a8184f6ca78720675c5b5f4275d6c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8-smp_2.6.10-34.20_amd64.deb
      Size/MD5: 15123142 2d3d006dc78a32754008cff3e6612def
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8_2.6.10-34.20_amd64.deb
      Size/MD5: 15092724 4e734222617027d0826e084a7e3597cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-xeon_2.6.10-34.20_amd64.deb
      Size/MD5: 14964346 bccdcbefb5bb21210d151f74f0d4ea1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_amd64.deb
      Size/MD5:  1367274 5255ea709eba9438f864847990f649a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    14228 bc2ab7f3dbcb6bb6254a7d95961a7765
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   178508 c29516f2b3469af77163b72298d5e6f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   174888 f25921c93694a64110d5a7e11c07a54a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   731206 feca94b0d02954dba96aa826e7ebaf9b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   780904 ee21c0a8ad817f4ce2bc0c7bf908ddcf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   150048 3b4939210ceb4e7760e7884b9f61f563
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   168132 93557c5149b0c723cb6b1bae1d3223ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     9560 b398092e7a80607f99e844001b9ce2a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    94864 91055c75c5899688a3603311f3cd71e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    45730 4b389bad5ff04bc593232239ff596147
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    33166 c3d8d2b805db006bbc15251294d3dfa0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    55288 5a3852574c27da25e4724161b869db97
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     4662 68477a5fa1a36be1105e3c456dd17c75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     7840 64d5bb446a53cbdf80acf4395943026b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    53806 b7e9b1db8d8a0ab3b587c476b8d9f43a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   111110 473a540114b990167e88b1b835ae7057
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    10152 476e66c50bcbcb4d88a8bf15d55ff46c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    60466 717dea9008ecb9b9a36d0226cf0be1f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   208566 6d9952396755a259def5a4386f0e904a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    69268 49723731dd5fc33f5448bbd4a884492e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   394794 d1c46e57ff011765315159a483c3a0c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   294492 420dcb7e37eb1ddb31c47d3412f46b4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    12076 3e1008788d41da3c607ef400421a1433
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    22660 e87793acc7765a88790795b4062ee8e3
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    28806 9e57e710d0fd1904006a61a4f85e659a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    56802 c415dc22fc38a9adf2d2e8c521b828f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    34942 ee496b5e756fcee4fa52d9af50e159f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   247472 8576417b43eb0294626b1b388304c38b

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    18168 ec0160e67b576a45d0a9b60f9df0539f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    44820 7087171327e9f1897f66c2402ee4f1aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   103058 acb437d3e579f3c41a0c2d701f21af96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    86016 7ca15ee69ed2d3e4c62b31854ff4efd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    29086 f8c9d199ee551ca45422a5431932e437
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    39778 23600db6a281e3e1c1a3b065f9b14d54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    71152 2e45e650a63660f4c86ed54cbe29d858
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     5500 d58ec539fae5fa95e142147ef369fd2a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    31584 15cf4fd046eadeff2dad6464da7ec09b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    52934 6936463adcdda3629c1e758d90f0493b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   104464 4b865ee7bd1286623919a96dd9d331b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    38630 27e882c090989d77f3613765117cf77d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   114518 89928ea529948cc91aed23a4521d5b12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   190634 bab287374233f076f223e0b88b34cb6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    86542 b6070419effbc3e1b4bada780612a0de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:  1390250 90397cbe2b320b07a1e5fda28405b4d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-386_2.6.10-34.20_i386.deb
      Size/MD5:   316356 536287da6a00cd58f2335077cbf4538a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686-smp_2.6.10-34.20_i386.deb
      Size/MD5:   312524 30b03b28a5de3945cfd07ff4742d1016
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686_2.6.10-34.20_i386.deb
      Size/MD5:   314566 e0309dbc4bde6ac4f9f9fe69668b04c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7-smp_2.6.10-34.20_i386.deb
      Size/MD5:   312622 3ea4ddbee4b030178d541f6fb467d6b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7_2.6.10-34.20_i386.deb
      Size/MD5:   314494 237e095f6a0cec83a253bbf3944bc50a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_i386.deb
      Size/MD5:  6138030 600e2668b0fbfe98f6cf40947f2eb9a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-386_2.6.10-34.20_i386.deb
      Size/MD5: 15613392 0c393fb103e76a59807f845de341fef1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686-smp_2.6.10-34.20_i386.deb
      Size/MD5: 16192420 995c8a1c4dbc44ce3fb966e8faa59768
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686_2.6.10-34.20_i386.deb
      Size/MD5: 16610356 305ad210ff1462bb06262d17018dbf31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7-smp_2.6.10-34.20_i386.deb
      Size/MD5: 16304792 e43e2941f65e41e7cee26f64ae737840
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7_2.6.10-34.20_i386.deb
      Size/MD5: 16672754 64786d4f0570987aaf6b106d83ad8c0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_i386.deb
      Size/MD5:  1366740 e3d2c30fa56a1d70855fe39dfd9af844
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    14078 3a8f33521e4a40bda0381d1d327e8968
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   183204 9a26ca972e9c058f0f3be0ce86bcc00d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   172774 20fe5bfbc166f19e8e9b59043141c751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   967872 16408fee6b8a70873333de59be722fbd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   780696 f30b922d0fac29994e579ba10b5eafb8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   140664 ad7cd49cb8c75b647d43cf8e99791ff0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   167946 598ddd006ee677dff42595b7d1ebceb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     9348 aff045a5ad6beb07a182a9ddb47d93b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    89314 9512161ad259441500ef387be3489caf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    48132 efbdc49d69ce5824edadd669d7cd74bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    30888 b3aac589af98b88c4696c1ce7bf13903
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    65900 652608558ced1aef35538bcfdf27b4ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     4508 c8fedf5c2e7e188e5744c1a62dea7751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     7754 a2813cdb0ae48a17a982a3eb7076fd57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    50776 dbf5a86b0ef07adf110fc4ed6279d73a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   111590 eb734c5213dc7329835012bd7126fef1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     9888 f316e1bba8978f441ea19c5780dc53d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    57156 a61515fe14e712e6ac7d982ec679dbf3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   242024 fe8a20aa87bc575dce65b91aed8f3c58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    66234 673964dcc1a485e62d7fcad8ceb6c04f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   436586 7ec1b2fc9ee8014a4ef8c329f32f8de5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   485668 859d40f7912cb33297ea6681006511ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    11470 ee405fc9ce8a4bce5ebb4899a43e1d9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    21242 a031ea0b4fee833a15bf6aa0912e6edf
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    29524 9df7a73cf3bf3b3cddc6c5906927f7c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   106268 86fb1955e75d519bf508c704d4ac50d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    33826 cd0c18957807b607b09238638d599cef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   261336 762d2b5c78eb1fcce934f16890ea2cb4

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24056 757289889190318a2d93dd15a65e32eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24060 ba42a459cdf5bed60f0ad664d8139cca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24046 993a4a25a8799a091fd67668950af050
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58284 1240aa61d4c5b12d7767cc02cdf875d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58284 0619c018768308c30117c01c731ad1c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58270 315b06ba207fac7ac09249157e262ae2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30288 099d26860dff0de837745950b485c98b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30286 4dc160336fe27917b0626f35164af488
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30274 853d7980f7b2c59a1ad311fa805f4756
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109250 caa823915173bb1677cdabb549fa8d95
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109244 e84f7701fdf1d516a0589f9a82f640df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109230 844fb56d5fa39e623ae8d5cd7dbe4e21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35388 ea0da0bba16cc5429dc73140469f7266
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35396 4ce2b8c990d878105d0b2dd6b1b9a6af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35388 8e82796824a725298c828a5d031fe205
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30934 f69937ec030ea1211eb7a24e9742adee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30930 7045ce60155a9da3daf229f4a07a9406
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30912 53f2d8f4f6ede12ad6b11830b0f2f021
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212970 472a248518c1b7048ea96d1b23456ad6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212958 5a1b6e8c5b8dfe4a0185d02c0fc26554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212934 10a25aaa511cdf7a75681bce0c632515
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6168 8884b25754c49f6dc547c596b9285b71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6168 edabe961784ea57073a121691048c6df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6156 64611d41b8c9228a19c727625c116f12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43432 c945080cc74082d3869523caa5754f48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43420 24d2e6b4126804665a6628e7eb895faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43422 4b8f545bf6e266a0dd497aff16ca0332
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4588 19a2f7191250805c1b4e11cd66e9ad9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4586 f8c968ad24ebe9b063558af9d420188b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4592 48e517e5e8220932037b4f5b5c56b25c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66046 f892b8dbb091ea7a618c51cd9af05754
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66036 506c3d7f5569dbe0b67062891cf6625e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66036 37791de6094db317454f48dd800e2b11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   117114 18306380adcbe37bce01d1aa271037cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   117100 39543336fafdac80b7b5c1f1ba146511
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   116858 a1969109547b95038c0d4c2d82083798
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66654 45afe2041ca77c4d13357d8584d65e55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66646 8d3681b2149e49d856d5b7a945334bd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66636 7dd7f75bf19ce375422498cc62c4d9f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142052 8da92eb380b87a21de0fc6b1ef2c1358
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142050 2b04f6f09e7a89544d5168834d922c41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142052 719aa290be93ce3068ac1ea67a437fa3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213976 101795a6563ecad2ee0fe4038cfc4766
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213980 686f231cff15cc539346186359e30940
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213948 e637923827f5f374d8ebf3a097c61a44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107008 a90440aa82a3f649a927ea8e85ea6208
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107000 ddf89961a32f81bdb80d2341685307ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107008 27a4243400b83d82226092c2e168e57d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1866842 4d45ac547824b9094e05fe3e63e7c02a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1871116 e539f7639ee9a123d235814cf885eefc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1901500 00c1cb0ccfb081f193d1307557496298
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251480 36117d5b58cfce171382a6e02314e58a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3_2.6.10-34.20_powerpc.deb
      Size/MD5:   250940 448da862924240716c18ae0f84898850
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251336 8d47fef9434788b2be5f5a522359d65c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4_2.6.10-34.20_powerpc.deb
      Size/MD5:   250838 ef7700333b9a779e4161f7ea5eb1881a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251714 557db525c5f2748c83058abfb57ec035
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc_2.6.10-34.20_powerpc.deb
      Size/MD5:   252428 f11ef2206ae15ffcc54992941c2c08a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_powerpc.deb
      Size/MD5:  6158516 8c55a8b0f59564f43828ae74687ad85b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15648120 06119c6b558d8a22d3fb8d5a1ca758eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3_2.6.10-34.20_powerpc.deb
      Size/MD5: 15211352 115bca7e2122c3af882f2623a9a3f245
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15636392 be98b2738250a6a93f38529b9b1b1c48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4_2.6.10-34.20_powerpc.deb
      Size/MD5: 15204784 3512bfa1d1938cd2c6af1eba41588674
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15552404 5dc5e6e10ecfb1749053c1fa763d201b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc_2.6.10-34.20_powerpc.deb
      Size/MD5: 15246444 41a5100af8dfc661083128ecc3f93a3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_powerpc.deb
      Size/MD5:  1366828 796bc9d0fa760e1aa182131079e9d040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17356 c91ee0cd2c8c65d84aa4339ac1e7039c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17352 2e348724033e0487eef21660787c48f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17350 952e68462a1816581efa18529aec8af5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213718 fd3c3d3e8a32befce12ea3babdf578f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213730 a40b8e505092aac312d05c096cf4a439
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213462 5f0044a3f78ed5198fb65849c0a2c8be
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210738 dcb0e2a603885b67eb7ba99c3975b7ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210746 8928793777ee8939b8e6d5535e3c5571
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210726 af72bd5a204186e19e3fcacdcf2aab1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   688490 3c6327fdbef4e4ded666c191bc261361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   688462 f943a6860e502f83cab9d6e560d4f340
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   687010 99e2b6a6e67ce1b003e7f25e724f86d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780736 d14e0a57291c99b02dba4b1d351a1acb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780768 f65a2750a293d260f761d1d12c451751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780766 aec7bd5abf7df435d3a8025f1e725a20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511284 7bc14cb016405a0b47f22f01a21ef268
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511282 f05923104b2b739cd49ee245b54811eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510908 8c05ecf22fc6a67a61f154039ded2e0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   257748 4722b3a746e61881b706539938075e8f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   257760 585446794b8c757d993551c0073f5e3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   256880 7163d9e02f6efbf75eb5d949c7b0df62
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84424 ff0f8ccb3e6b06b6eb26a44c6553952b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84434 c139668816ed9a3866892ec714464d6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84410 e6da0e37ba3c9143855046c72ca0f113
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60990 a40533076789c93f7d802f710e86c86d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60990 fc537a0b3559eeeb9e294e8dc11b3e1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60996 a3430bc4c0a1d278e9b59f247e550705
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    65014 53323a0fcbd6ef930d6d04c10ee9957c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    64994 8c8c547e820d30f5faca3daa70526992
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    65000 30da7de0797115c8e3a0c2dff0480a03
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5382 904ac2993045228a4da410aacf6b4d7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5376 c7cfd47200fab04e3faa4c695162bdc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5374 fedf96b5a2d08704b4e4878a07a3b8aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63274 9284e5151feb56b75e116c8c55fc3c68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63272 cb148f32a7f899aae29c2c5190a7e006
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63214 4f30572a28d1bb8e9a5bd10e005203e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131660 ce65874f5cf1ddd9a084bb28260b16c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131654 62e5c69450c22be6c6837c1548699a35
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131664 b45962b63cc1abd3337fd7365238aca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70978 8c036c5f7283fa8535a8baf6964c034b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70978 c028838cae3aba6a3ee55fe4c4e1a92e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70970 983bb35437777b9838cb1f524b8f9ae8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357328 5b0f07aba03289d17cc06e8b8f546be5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357322 8267fec62f2d7d68056cdb1c8b7374d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357340 f3520761c4745ae7e107830df15ae180
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80734 6882e08074865ce3cff13f95b9d23d33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80734 1d7036992784e85836f80a13590e2bc5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80744 0935af439af117d9b220cd8f231237ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511000 f8a3fdbb6f629507ca54c304c14148ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510998 a366d8a51abe41de8dcef7615efa82da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510796 7ca8480e9b3556182bfa80dd6c181550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389156 499eff26442a314eae3fe1c872b5482a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389142 7beb872afe060ccf51d7f3695730cabb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389012 6a22ab402ccbe5bd298cf4155d75d0bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63154 eea1979f3b80f2ab9abf078ac8e197f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63156 54f520b629bef13454556bb34ea08a33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63034 8951dc31e725e384d96137aea32592fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23350 9ba107926181bac0aafaad8bc9bfc9ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23348 59a355a0021eff64feabb00676684b1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23110 45047aa03d1215f589c2366284f7879f
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35380 28435b192a5a3556be33a5757be67325
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35382 2db9e69bdbf7f1cb7d5b10efcebc1246
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35372 9d921ee807cf5a579dc094e582b44887
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135108 01c56f9c0e8dd309303f2f40bc1aa39c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135092 230de80d437472f0948a9491f470cffd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135084 19e0cfda95d817fc623c4a508d4bb841
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42400 b37a28eb83f0acfe18442131564a08a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42394 d1a235c0e4de4fc37a6c2ae9e84ab2f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42402 5d060c9249ebd12487011e6166672664
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294756 bc39cce7e6ab2a363b7690f151dbbf11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294758 64fbd290ee99ec65976fa27be80d2181
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294760 eac6b1685d00367e36bc02e25feefede

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34.diff.gz
      Size/MD5:  7979048 d8fab299fe68cb01ce0d844b9fdbc6b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34.dsc
      Size/MD5:     2516 717c666291065123bf806e176d48f97f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12.orig.tar.gz
      Size/MD5: 47177098 9272115d4005d4e9773a1a6170fd20cd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-doc-2.6.12_2.6.12-10.34_all.deb
      Size/MD5:  4553566 a1ef4071c2e8f956f372096ea33a3995
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34_all.deb
      Size/MD5: 40455436 af9d928bdf0032bc223f42225433c58f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-tree-2.6.12_2.6.12-10.34_all.deb
      Size/MD5:   377152 5f84388b8a3a218d10384c83c3f528d5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    20808 d4e1b65a57dbeeac45b33f1521e12c99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    45622 8cb0121682bf09f1cac846ad64a43f5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     2320 c92669893cd0d5646a18fc4c18f68bd4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    88708 3ae3d259bd31755ed3510d5fec4ccb24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    35156 44702bad1e1adbc8770628279cbac3a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    42378 9de89c3a4ac37c66760745f43c1a000d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    70530 3c6799cc5a6ffe13980895fe22e3dee3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     5746 24ac1bdf68c192d9412ee5452ea03e5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    34338 7f7b482747e204f0a0f4db78e6a051e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    53484 25e8bad4e6d7cd6938ba1f90961e3464
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   129596 a90636d93492799fc7597e5759242b73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    43852 569c0348d5e80c94fd10b985ad807ad5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   115024 a7d6544e054dcb37145707a0a2902642
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   253688 7bb33fbec57560a4f2f7c3ccaf56ffd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    83366 6237abcaa25f389cd4c7546b43c055f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1497886 f52481f0a97e674e1e8dab3a107dfb2b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-generic_2.6.12-10.34_amd64.deb
      Size/MD5:   804646 1f19fd29274b18a73a4fc02c3c073657
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8-smp_2.6.12-10.34_amd64.deb
      Size/MD5:   802778 8faf2d64387e02bab3493334522f21e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8_2.6.12-10.34_amd64.deb
      Size/MD5:   803708 efd8f8c79f3f92f15cdf1cc366566e02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-xeon_2.6.12-10.34_amd64.deb
      Size/MD5:   800000 b8c368ca60877e92a2cabfdd30d89868
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_amd64.deb
      Size/MD5:  5919914 b413f0e78573a9c873a480fc189a423a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-generic_2.6.12-10.34_amd64.deb
      Size/MD5: 17088402 37f41a50fb5916add1d458b2e6f9dc6e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8-smp_2.6.12-10.34_amd64.deb
      Size/MD5: 18131064 30de98a63a697abcb8bf14e7ec205e60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8_2.6.12-10.34_amd64.deb
      Size/MD5: 17954132 c42a140a3c2a7646f65ef7117b05b30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-xeon_2.6.12-10.34_amd64.deb
      Size/MD5: 17898622 9f497da74da9f09eda195cc50a071b9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_amd64.deb
      Size/MD5:  3511958 490f151109d769124e4be9d231cbd3b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    14300 8ed855968175cd57d89782a2257eae44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   191796 d6bea66878fd5188fcfe3034af011b94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   170372 e6a54dc47f933d81d33c36100f06710c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1048458 f4f4157facb4a8c3ad0bf7b79ddd09e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1147282 cb81368443a48370533bf2fc8d411bea
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   122452 925cd634d430593dd61b3ead0fce05f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     8546 dc36272ab8439fa0c33dd3cf2fd4495c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    99026 5726cc1c3805a1e7dcd460f0df0347e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    44950 df5b62d66bbe6e87bf175bdb96de07e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    31658 7beb1e1d79e55022978020dd63c2571b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    65706 24c8b8c3a2b542e478b562b4965a8568
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     4478 35e0c3c2a2a8f2c3ead45252790906ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     7882 a423baf7b6a50f53eae11f7af4fe7b65
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    53872 be98c2351e732d52e81ed700ae0f4f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   107332 6e35f131fc93466a08c4e30051ca798f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     9884 e68b6e660a617b2b018e0f5882f9a132
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    69768 cee1cb4c98600a0999cda318e3223410
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    73064 35945a4de11a4927448880d441936319
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1271098 3871bd54d9892c66fa072b11b23f20f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    58398 03084628ddc86cdf90499e490e1482f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    22216 0bd9e6e3003a4c6ec4ed8e2958af3305
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    29364 8bb827c06f72358c9e198ab9d2e21ab1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    62202 4e33828f4d30b055bd7328ef26e7119d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    34966 0876549f10809902c91fdd898342ffca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   248890 7e8ac8e3b285da4bf4f570078661ecbb

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    18670 46253f05423baae217a77160929abd1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    43956 04e007efc1890407d07ac6db7d6efe41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    96878 230db298e7a1af1773d06f5fcf7745c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     2280 e90a29eb6bae1b4eb30271de051187af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    83574 7da2f3e4a347d27d0cd5c316a43ef196
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    33136 722089975c4f881930a70533cc1ce490
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    41918 84f609e4f4a029aab7f8728fd7babedb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    68232 cfe7f9a0406ec1c6244749c5f4f582c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     5366 8891bff0625e8fcb31b03f309ef678b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    31132 34374bc39969804a5c59209c58f56ad2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    51410 4373ea79416b9221cf1bcd44e71734e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   123396 99ab00e2239c416f8fc9fff3235c73da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    42476 67e415fab7cf9a045a9e7e1b008da27b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   110270 8aeefdd52c20dcbbce5ee5e14ca42473
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   239822 55a7a43e374397c6f393e9f062f8192f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    86178 0f83056aad3dc95fcb3e33020999ef46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1418110 018188f299f0952cc08b877f938ddf63
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-386_2.6.12-10.34_i386.deb
      Size/MD5:   802606 fcb043d7a33501068e4db792098aea22
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686-smp_2.6.12-10.34_i386.deb
      Size/MD5:   798106 3bc7ed5bf0e1892370a13432b6665f79
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686_2.6.12-10.34_i386.deb
      Size/MD5:   799908 5015cdbb03ee892e169b86d2cbdaf5bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7-smp_2.6.12-10.34_i386.deb
      Size/MD5:   798160 108f5c8dbdbded4f40e2c9149f265960
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7_2.6.12-10.34_i386.deb
      Size/MD5:   800472 13139f5630a0f4bc3647c2e7ecf0394e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_i386.deb
      Size/MD5:  5929346 15140ae5024da8dc9a2dc68bdbdc7853
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-386_2.6.12-10.34_i386.deb
      Size/MD5: 18026476 d47beaccd8a495c3f07423250c79047e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686-smp_2.6.12-10.34_i386.deb
      Size/MD5: 19368024 801e45ab6d3046734ec6e8fd0ad36190
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686_2.6.12-10.34_i386.deb
      Size/MD5: 19464046 64ec6ba5515fd363a4a27d13a1799186
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7-smp_2.6.12-10.34_i386.deb
      Size/MD5: 19500468 cc6b7b5f0fdc81f7c87616f9d077e320
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7_2.6.12-10.34_i386.deb
      Size/MD5: 19545538 413f75daca580466b82a9b49e22c26a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_i386.deb
      Size/MD5:  3510544 92a8ac5f1b52e752a23882a779ebf610
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    14530 b9c76cba4a838d75ae05e3db8f189031
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   194796 5b73a43d75060dd3f79d7f8316b2f693
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   166500 486495a8bc366a19e76c47ee9046f7b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1048168 1a25213a44f78a8b3edbcb052bd294d9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1341408 1d298a9384d1e31f47d7382d3d0cdea3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   123680 f2098f477c0b4e9cf05b1b2f881e3c6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     8246 fbafff5c5134ac026b69b5636e5d5e0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    93378 94cff703adbf87a0f3b61c227b67b43c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    46820 14c98bda4ed3afc6fa22604a31aa8121
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    29774 ac0cc81646211e9717872143c062431c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    72282 49f7b2672f23a07a9dc566492300154a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     4258 306b5328546cc534669e40fc26140d4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     7666 fa9b8a7958e9409c86985ba3bd851b9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    50622 24b55801b2f2de3bfb139edcf8058d51
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   108634 d3f9edaafdd574f7bcb892e818ca4735
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     9806 6ce1cd2142ed99ed592ea4fc0d96c3cc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    67636 2fe3b7f78eb11cb765b31fa8415ad867
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    70182 e47a757a3f27a84d3a068acdce1637e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1481126 b53e9c227b521fe4473c5ff01ab6cece
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    55208 1789fe70b41328c793b1771a40cb8913
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    20352 20309045486b79420bea54c61efb8616
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    29912 98f21701e784726f0261128365dd38e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   111228 b92fe1ecf12ddf979ed48dee47d3bd7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    34562 b4fc511cbcfbf1c33d4030b0da021c4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   263266 74ec9f373022052012de2a16a6a549bf

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    23362 64ec1f12d26bfd20f070fea026e0e4c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    26352 82a929fa11bd35bd54101aa5fed1c55f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    55914 426e2788e1a026c2b1a80b5b2ec13c3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    58844 6e8417a965b3fef7d72f365ddc5b5d9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     2312 625fdf72197c5f7fa3cef4f8e759bc72
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     2514 170397e811d8092082adae16b51d6eef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    29752 ffd91970cfe4cdbc3a0ee33c0968c40e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    34718 42aa122487e67569bb35924368c09458
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   104678 8292475a8160b5f935982b3ca39aba5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   122196 60ac500415ead2787779983c8b9e2f9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40500 18998450a3739e6a9846af9d7588eca8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    45914 eb4e0ed013d8d87a864b732273f9f383
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    28996 94ce95ccff6fcee760062fa36ba5478d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    29934 5abf5e07f1754b75dc4c355dba3020ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   210090 ea30784ce9f1fd689d4553d474af2f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   224774 567f2483f973f53f4abadb5634d7e98d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     6148 2630cac6fa70f627aa9333e93f06275d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     6966 591b5f3cbc4048dcd7df126bf90ed17b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    45168 3f3da16683cd03d8bbd25f1ddcfbf642
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40418 3b77a7053457f4b54b1894719cd8e226
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9792 575d60fb9e575d26c693757f9ebc6283
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    11786 6c0a30ab0cf31a06403c59ed0126410a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76784 7d6ec8c375ef661b9c6e22d1b119e5e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    85196 ea34886aa97c5f9bbe099140a06b12a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   112152 3347adcce6acedec90fa7ab802b931f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   129228 f47571ad7f6d55fe5e4a7f0eff991120
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76744 28c2763e89db8cbcb5969d86f1763d60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    90418 5c1045f51afa993577f9c7934252429a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   140756 dfee46de58f2d21274480e508592c024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   157284 a6b80f44cf6e664f8f9f422a9f874c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   306088 df9ea1a468cc71b6377ebe4086399e58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   210720 86525b53657fc9415129e429c4fdc337
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   110782 ebcc06f4a57efac4fc5d4a67a6a889b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   116650 8c5359805d7ead36db59d575a7f5b8d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1976510 bde3db48436b88952f3d11b0c4faaa45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  2350458 447efc5e01c183ca0fa80cbea880109a
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-headers-2.6.12-10-iseries-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   773920 10213d665ed315bbc6092333d40fcf1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   782804 624a039969962e0a21a830a8cece6899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc64-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   800732 785f06fca97532b91d7357a23a432309
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc_2.6.12-10.34_powerpc.deb
      Size/MD5:   783272 4605c8ebdac7e78b61c29643068755b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_powerpc.deb
      Size/MD5:  5937076 18e2574387ddb85392ac3a12235a6f54
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-image-2.6.12-10-iseries-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 19521394 20464585c5cfa6a8fc1670a6e89f10a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 18358580 4262cde31e55150664bb501635557169
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc64-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 21186426 b2c5090bae7ff88da6fde238d9f246de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc_2.6.12-10.34_powerpc.deb
      Size/MD5: 18006446 adb49c6a5bd73a4cd152087feb36eef2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_powerpc.deb
      Size/MD5:  3511906 d15ad4372d829ac80afae83ff805e5a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    17620 1733c726a1a5959654b968236d9a12a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    17786 94d7b2c8d885e1351f97105081670afb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   234110 be049e3b463e57b26ac9a221e0051073
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   258856 3e261360233d9105059a2339792e057c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   208854 4184a5925174591fd12cb658164ca8e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   235402 7409019e891d013e701aa0a581e27c2c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1048262 3c1595317b3062fa31adc54be528740f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1048452 81dfda3c9cf1ac1aa4e4cc3ac3d81360
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1457996 bece9fc2948192cfe95ab42597fa7d4d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1623022 9c050db9a4caa649739e7f59208c5cd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   212810 1524118652212f65d20f8d65c6afc16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   197970 1fd46fa3d4f1b6a0d74109b3adcd21d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9462 fc5ca3c3a93a8b74b7ed16d16b9fe92e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9060 2dc94cde22220e0c2e07d0187685af3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   115324 5cf873d1484b00c0d2ebe69f6b0e7db1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   134454 076ffe576e767b20494a2d78242a4714
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    77020 e51db9b034ce39b8af53d7cafca8335d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    87530 9e5befe810a56cc3f2e415c445b5f1c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     4812 cb1f792315833bc74cd5aba4efed179c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     5286 b2c1e5d48dc27772553d4a1c9d74dc47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    63050 3cf0fe7152cd05505c3c232dd64b1864
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76008 c5c25f33a7d43a905ad4ca329a2cd5af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   128626 9b35a60f1ec3a7ce212effcfd3280ff0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   164360 57dc98ca56df1946eb90bf221a4b3f9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    77430 34b0aad78bf32c74dba7ec5c277d0c53
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    98154 6d443efa2e82993e93fb368030264ce5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    85238 3ade6cb5c6ce17dae4b19eb5e320d1e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    92326 f01b4d714601784f8a61448ddc9119de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1537866 8ebd1ed508ab39b4342f443e9e6dec1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1755650 48d11d813ec0190d14d451668556a8a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    65294 c67db2fc2166eb858615b2fcbe19afee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   100434 388f35e6576f9efa9ea2d4beba03b7ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    22886 47547ea2ec62282f3c474e6985ead2a7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    28604 31705f1d1757570ad82004f1d86af521
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    35496 6a076f2a615b0a081a3a414a180b6fac
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    39802 ad4a6fe837c1c13f1cc1c08ad2291ac3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   139882 d9146f734ea9b6e3c123b357f1b77140
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   152636 e9c8ca6da057acc2be24e97902226dfc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40960 14cc612a1d4ec2229c0fd5b99ba50946
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    44426 cfbb4ccdff54becd8a94f45979c88d4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   296160 da32b18c5aeb077081180ebf8a330d5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   324194 c3994807d7fa8f88bc24db36c5519aed

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43.diff.gz
      Size/MD5:  2079780 b9f583cc6afdf2977c8b8eae28b5f440
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43.dsc
      Size/MD5:     3019 66ee7ff62ef8b71dd20d647fa873725b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.23.dsc
      Size/MD5:     2895 50a5cb7ec78f77fa764829c7a3753b67
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.23.tar.gz
      Size/MD5:    25216 9952710cccca0aba2a75fca926596389
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-2.diff.gz
      Size/MD5:    87047 2a3528df6d0169f3d8cfca46bd1ef2bb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-2.dsc
      Size/MD5:     3190 0306c9ec6aa2cdae0cb334ac91566711
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11.orig.tar.gz
      Size/MD5: 97566445 8bb235f9119aed52797b057827756b8c

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-25.43_all.deb
      Size/MD5:  5154730 5cd462491c50cd8ee2c7dbc911b22fcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-25.43_all.deb
      Size/MD5:    85762 418b47578cd3a7729aef8e45b93a6f7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43_all.deb
      Size/MD5: 44459586 a265911f19b0f2ee0613e73e7cc765f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-doc_2.6.15.23_all.deb
      Size/MD5:    23308 255420b11a34aa739ef00e860bd43cab
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.11-2_all.deb
      Size/MD5:    17742 3f9c1648c83b0fc47978eb38a63b437e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-source_2.6.15.23_all.deb
      Size/MD5:    23338 fd9604c438a2e39022c5f0af7e93b508

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    22134 ff67a9629440c827c398e0e79fe12ecb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    44754 2019c1dcecf960ac20b3ed8df3592bcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     2306 d55926f34c8dbb464933e3c1afb71ce7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    36182 fab255d4f6c1afa79de9c1d9c67bdbe1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   102028 428ac80eeb1d1dae1a8a94b3ea843e81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    38616 32a5aa329626d31d79b0fbbb822d8a3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    49124 9e0d33a6b7c9c563212fb2951eddea01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   176744 62cadc976b86e84249a7047e6fcb0176
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    36760 997b87b399c420cc2f0f69424716763c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   142154 9d002e9f1a6267296400452211c3a1dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    51006 e199e786ad81e0413ace74311e27089c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   140422 589745ed6249cc83af7262d24a199075
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   286882 272a18bb84e98868173c1a3fedf6639e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    97792 928ecaed0b6a0c3d45815015787470f3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1643610 25e6fc6e89fa37d3866010a3b9e5dbe0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-generic_2.6.15-25.43_amd64.deb
      Size/MD5:   857810 5d53ad23b33464b240b8f7f6ac76590c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-k8_2.6.15-25.43_amd64.deb
      Size/MD5:   863364 98c8bc48305c0d97d5341b262256b0e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-server_2.6.15-25.43_amd64.deb
      Size/MD5:   862374 0bb2ef56b038415b9d7482c8dbcd8c0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-xeon_2.6.15-25.43_amd64.deb
      Size/MD5:   862206 77285b205416fdccbb0b99c372688a33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_amd64.deb
      Size/MD5:  6906656 55350a0c2a37a2d55c0c68fb18efcf3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-generic_2.6.15-25.43_amd64.deb
      Size/MD5: 20711310 674643934508f7ef93aaa85b7b13be1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-k8_2.6.15-25.43_amd64.deb
      Size/MD5: 20686212 ee34b40249f31deecc57256c959bdc6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-server_2.6.15-25.43_amd64.deb
      Size/MD5: 21531804 a1f885449635fc0d13b4211eabc97130
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-xeon_2.6.15-25.43_amd64.deb
      Size/MD5: 19806164 cede5e9bb4229aecd770e63391f2c676
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    15622 6c3298db44af9be7c2d1b88630b16f2c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   240272 be9bb3fd65a9a4e9f0d036c64c3ab5e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   202564 677f7025f079a9681d13975992594dcb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1048592 ae4e13a42308218cd9c37ad54a0c9b24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1432248 13650fd19387cc9b339ba3c1f3831c13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   161568 b01436219f7ef600146571056022650a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     9826 547b5f3f764f0a01f16f7be313d2be66
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    80862 8952b15f4f74661cc19b1db892ffad14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    49168 92cf2c75382f40b416ee1980968db272
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    35146 9ea1f20e0debd152b80d5b17b1a42d74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    70874 cd190044b6440a1ffa143b8af3e21614
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     6218 35c6d580bbc812ed279c1757659621fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     9052 b25e260615531677f896dc1ec9a71f01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    57880 8a18e4dd75097bcc895ecd40cbd63030
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   123320 c3934fa49d6596a1cd6993eb122215bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    92180 3cc4403a41280e3f52e319757c87aa7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    79208 b8c6d0361eacdd8119c48cfcd18dbc88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1595700 1d565ff7a193e4ec3f8beaafd5a21e19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    72276 995d2c3d79923d1c51efd50ed3dc9bfd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    12644 b09ce59c7cdcd98daf9f50cc3bb87530
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    33732 98d90b38c588de131651837012eebad4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   138184 b1525f07454e4194cf363148a7258da7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    38862 f2e4bf9c1a7a8859ac96d962dd9f0dd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   278740 b58470959c82549f4beb9de5703c154a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-25_3.11+2.6.15.11-2_amd64.deb
      Size/MD5:   474866 949a50b0afdb59c4435d8002847e303e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.23_amd64.deb
      Size/MD5:    23370 e49f383977fdd6657519d810b607d899
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-2_amd64.deb
      Size/MD5:  2404872 8d1116108b85c85a6a15384a3d3286c1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:    76052 85c23cc1cea393a31a4ea7e903b9b33f
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:   510186 e4d5a3e09213b00e4af48ab3a72d797d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23374 8783b4eb94d35863b6b23521ea8800bd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8-smp_2.6.15.23_amd64.deb
      Size/MD5:    23446 bc2a14958ed454a956dbc24693694e3f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23376 1d0c6f32cc7c27867e9c79681612794a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23360 d6f1b5d1861bbf87888c938487909613
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23374 727c695add46d900405a8f567b96bc5a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23360 d76862c34b4a4b99512328b6ddbc23fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23368 83daedb2b7f64937a72f92e20edbed59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23362 7a92d965e6cd2aef070fa91de991bb47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23362 d9081edb52550a76a17eb658f9920eb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23356 ed64d1150e18a54b15a56e2cdf228b61
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23358 a4b030b97384c5d543a03e4261416d77
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23356 73fcce335996d8d1f3c29bbe806dc319
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23356 0aa9f2e1f5cc7ba2007aa9834b823369
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-generic_2.6.15.11-2_amd64.deb
      Size/MD5:  6861066 5334e0046eff3f8041e8e0511c43b805
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-k8_2.6.15.11-2_amd64.deb
      Size/MD5:  6860570 9eed4452dfad7e8cc18341eda36a6a6a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-xeon_2.6.15.11-2_amd64.deb
      Size/MD5:  6837408 cc2866d6b856259d053aadfd640f1192
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23386 587c9676bf28a8e1566909ea41280ee9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23390 98ea001744e627d489a2c2bf1ae19dc9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23386 b70b8ace9c1f40c8a982cedfdfb770fd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.23_amd64.deb
      Size/MD5:    23322 b701ac0c170731f8d0f1d4228ace7361
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-amd64-generic-di_2.6.15.11-2_amd64.udeb
      Size/MD5:   799520 3768c1fad61bceeac1a91b1e57edf577
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-amd64-generic-di_2.6.15.11-2_amd64.udeb
      Size/MD5:   497768 097a2c35531e637f747afc8899861efc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:   166006 0dee1273cd970ca7739f0d9270b72b39
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:   161600 30f6fe642174f141ecd5607259b0e3a8
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:  6070426 10cab4b65ca1bf77318b99eef5432887
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:  7320164 eab467f972d6d33a0dd2e75143a504eb
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:  1758336 8eeaca383a0c35624fc31c518dbd2164
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:  1405544 dabb643a583e5f5b37dfbc3d025edbba
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:   125124 5a92263171f05d6e169472be5c2cf1f3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5: 17296342 8664077d25232ab74881ef9da4870ac4

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    18966 4db259dfa66d1af8e604c9bc1512f040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    43454 9effcdb9937fd4af0a82efa3f43cce6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   105200 8ffbf937fa2c397357e645d345339e4e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     2280 c4a7e19dbd64dd628279a74ace5845e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    34476 62a17c898d87177c4821b17431ef265b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    96794 e425aa8735407916fc42468f1d1ac4e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    37066 d34c160aa30e4d0a0a4973b33b45cde3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    44074 4ac2d0e974efd03522bb70d214907e74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   167672 fe83fda8fee0bdb5ae28dfeb272bb155
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    33926 0c20183403740be26aaea3995804b0dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   137794 3bcd8287178447c6e27fe2e889677310
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    46846 4a9b7866654878153875839b265afdcc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   132754 6832ef7eaa4940258a1886120583aebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   273640 ef5113efdcf6214c9d8f7c8796d35253
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   102252 eddd6d201b83bfb58244b452b51d4416
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1594594 1fcc8bc908bc9d51ed34d604f28c0baf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-386_2.6.15-25.43_i386.deb
      Size/MD5:   852348 098f1592bb44875107ebadb7085e8faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-686_2.6.15-25.43_i386.deb
      Size/MD5:   855314 837773d2dbdbfd93826d19875a6b7ef8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-k7_2.6.15-25.43_i386.deb
      Size/MD5:   853532 bedb504f1918aaddc6638fd6c2ece0bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-server-bigiron_2.6.15-25.43_i386.deb
      Size/MD5:   857216 801415bfea06f758b09aa6a62b4d144d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-server_2.6.15-25.43_i386.deb
      Size/MD5:   855348 82df02173953f35a1d2cd93923c06693
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_i386.deb
      Size/MD5:  6898992 6f551f5f98d585d1159f77a46c021ead
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-386_2.6.15-25.43_i386.deb
      Size/MD5: 21617016 6eab13de38c2a833941274fbc52e1cfb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-686_2.6.15-25.43_i386.deb
      Size/MD5: 22400042 f223520f53102dd8d8f946d9d0c5a7e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-k7_2.6.15-25.43_i386.deb
      Size/MD5: 22145868 e881960a141dcea275beaeab23c58a56
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-server-bigiron_2.6.15-25.43_i386.deb
      Size/MD5: 23510198 6661359218f8410eb7ae9bcf7f0ac713
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-server_2.6.15-25.43_i386.deb
      Size/MD5: 23061696 d5721fdabf7d83a64c9448e1b52f3a64
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    15496 56f9f923e4576db341f4af69675eb164
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   238434 96661b9d0051bb19647af21210162ee2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   196962 af18e6ff73c5edafb60a25aec076c4ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1048386 50952c3c8a187ffdf7c3ff203c3f5541
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1631532 7c1efa5d87752482381c0720072a07e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   160754 f17a1fc9525d89993b8b6de8f94c4b74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     9158 199e9b6c1e1c6fc7115129b200ed63e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    76482 7e7b46454225379d4722dec8eaaf8a76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    53248 ae0df304ab4c7d7dbafda1882c56765a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    33054 609720e4943ab874577eac0c94ffb62f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    85616 cbd3e65a77c3b70a3e0f0d5fa23cf34e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     6024 ac12c96fb84f6c807cc15c6d8f08089f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     8754 32410bbac3a6663f1d108f7c13027e4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    53594 94b6411e5a9bee1e5edb8e574037b7b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   130776 5c39088787f8861437c46401aaa04885
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    90358 087190d72686fcda50f17aae9343eca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    77114 fda8eb92686515697c22ef29b1292396
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1769690 30f3dfe372b6a5a8ba29d4428f7a728f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    69556 da87db3cc9d9e70b50c2dbded564c300
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    11758 0a89a1c85ad41a6c1282de9767e0ba7f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    35998 db5df0db601e6c87e8a8d3e2707eae3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   132280 7a7f0954fb7006cb1b0a0ac0e25f0742
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    38464 5bfbc46a68c0fd83e39071ab0d29d9cc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   299114 02f56acbf7c35cef132423589640553e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-25_3.11+2.6.15.11-2_i386.deb
      Size/MD5:  1204376 ee383fc8c7bdccd9b7f1735c2c9585cb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.23_i386.deb
      Size/MD5:    23374 98b6f289aa92b3e554fae20ac764d85c
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-2_i386.deb
      Size/MD5:  3692380 70b73c1754b364a087255396f57f7047
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:    72956 b3fda82fd1880c6e29a1517b021ecd4e
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:   660264 1e075527c2fcacef72985cb8f29447d3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-386_2.6.15.23_i386.deb
      Size/MD5:    23350 b655a17dee05f2aa9399d8f2fd435297
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686-smp_2.6.15.23_i386.deb
      Size/MD5:    23450 095e7e9e2a35d20dc67a6143ef82b1e0
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686_2.6.15.23_i386.deb
      Size/MD5:    23382 5ec06667b2fe0e7d83514089afaaf605
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-386_2.6.15.23_i386.deb
      Size/MD5:    23336 4d9523269cbe8f1d51b80ffd6ebb52ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-686_2.6.15.23_i386.deb
      Size/MD5:    23368 9d033035e09fdd91aab6dbf0c8fb3e52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-k7_2.6.15.23_i386.deb
      Size/MD5:    23348 6d82b0b953616c538170f08025543f8f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23372 4566452a28e86a21540f6443e7800600
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server_2.6.15.23_i386.deb
      Size/MD5:    23360 1533f68d19639e1314dd69286bb9f75f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-386_2.6.15.23_i386.deb
      Size/MD5:    23330 eaf3bb4eadaf10c3c38e8cf4d96e0322
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-686_2.6.15.23_i386.deb
      Size/MD5:    23364 d45bc99c1899276c84bb8186d88e0912
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-k7_2.6.15.23_i386.deb
      Size/MD5:    23344 fb4fc12a5a39baed75dfb822c415d02c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23370 837ffc0e9458051da0d9c6dd42b05092
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server_2.6.15.23_i386.deb
      Size/MD5:    23354 4b70065bb5de55f807339e9aa90953fe
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7-smp_2.6.15.23_i386.deb
      Size/MD5:    23430 414373d5a5a1170a44ce2665f82dabb6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7_2.6.15.23_i386.deb
      Size/MD5:    23362 c55dbba4c7f3355df2dc9da175983a83
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-386_2.6.15.11-2_i386.deb
      Size/MD5:  8137568 b60396e41728f77729e34d884f0fb61d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-686_2.6.15.11-2_i386.deb
      Size/MD5:  7939206 a9f9d34163a391f3fea63bc6d759554e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-k7_2.6.15.11-2_i386.deb
      Size/MD5:  7937984 737fd0a53873751c8ae6ce424cbba6fa
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-386_2.6.15.23_i386.deb
      Size/MD5:    23364 97b7d4b0ccedcfb481536e844e9944d3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-686_2.6.15.23_i386.deb
      Size/MD5:    23398 61c0aaa00119c783ab90bd8a3931dec3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-k7_2.6.15.23_i386.deb
      Size/MD5:    23378 80a80ee871b8de8d5a3b0b1c5dd50fe1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23370 01225ea4914bf6b037586bf3e0966c02
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server_2.6.15.23_i386.deb
      Size/MD5:    23352 73c9fa16752ef9105ae764b5b0b0dac7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.23_i386.deb
      Size/MD5:    23322 c6b100db3aaa730cf73c4490bd5ca12c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-386-di_2.6.15.11-2_i386.udeb
      Size/MD5:   799338 5a980a3340d617887f12c930f3a44483
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-386-di_2.6.15.11-2_i386.udeb
      Size/MD5:   475488 83de1b5ed76ee9cb716ac1854d25e636
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:   146740 25d0c45b1ecd61a8d64c8aff51f5a5d6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:   139692 e138399a40736b887208999c33c6cbcd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:  3060002 8338965631496ecdcc36d0f5622a8f01
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:  4058936 4c6f353d50ea4c3e3cf053e06290c5f6
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:  1693126 63d722c7baa07046838dc010d29bed3b
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:  1401342 33b172c4c67772d6ac6aabf9b340a61b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:   110602 39c05f985f7d3faa169e0174bf902d7e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-2_i386.deb
      Size/MD5: 10556804 4263979c1848292869c4d6510fb98939

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    23730 7faee7c638f34242a10a3e2c9e8e827c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    25940 7ae430079f8de538734a1917f0fa4ebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    49290 692e08c8578e3af785c97270c051ce85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    51518 1b888b41b618d4548c31c7b2f055d6e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2300 5cd4ce64af230c533070d82f38b1a7ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2476 a68a02505219f0ded4c523d5360ba251
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40116 7009389eea11a821202b23839918565e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    43680 400bb6f10e787141303d76693f2b84f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   112348 f933eeb0cf2dcf72372cfc4d804c008e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   120436 72831068a1fe03c280d1162a48dd07b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40848 63282d28ffe5ff27424896541002735c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    45340 182fa9becd9aaca3be5a5c514fb5181a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    29024 b009956289b247a1228b60c989c88a2f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    29896 e094885841aab990e1b130a9e720c598
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   211388 54750fde9a763f2a01f62d55b5bb574e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   225200 dd0c7bf901a410e42e732f78edf89388
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    45042 593cd5a0545cfa96da3a20b71f0acee3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40212 26404f5a683f0fa91b8b4e9db1b246f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     1928 253d3f8daccae2b3b2e154f680539694
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2198 5122db987b8302605f5475e235440825
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    80590 f2e9b3dcb39f166ef5782a31370b7d1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    85942 bcb8a9300422dd2bfffacf3139faa909
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   111616 7258a4971a55232396a6bc1e91241a36
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   125742 2a28587128c7d651af4b9dde9362bd3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    53354 0d8d0bd87be4aac9773fc592f70111d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    58460 9a2e42b21b9aba0a50ab6abd708be275
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   147648 6bdfc456aa0f68b90c525bf6b15c1ab3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   161432 7cfcd9691b10c9c077b11418aad781ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   317558 d2a26e66cd6842fa1d63300b13c04ef7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   287648 406a545c9ba766dc7cb24082b2c3a482
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   115848 c751a0d23abd4b64543274c493c37115
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   116504 8fd087f1bcc466e17b9f2760f83035e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1922480 6b8174ee79ad890c64ae95938410232e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  2425262 0ce7eeca8abdcee675772eadf1a5aeca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc-smp_2.6.15-25.43_powerpc.deb
      Size/MD5:   865852 2da28f0985e5952dc12766b962f36ef5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc64-smp_2.6.15-25.43_powerpc.deb
      Size/MD5:   857492 b548be24713af5884601808c23c00d58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc_2.6.15-25.43_powerpc.deb
      Size/MD5:   862646 34b20d1dbb695c35845b8be539e20829
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_powerpc.deb
      Size/MD5:  6930880 962055cdefb409ec8ee7b1c48ba3d1d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc-smp_2.6.15-25.43_powerpc.deb
      Size/MD5: 22654004 e13307b4c56dc2b876e9d304a421ae42
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc64-smp_2.6.15-25.43_powerpc.deb
      Size/MD5: 23539726 c4f00a3e4a1c2bfe0bf6c7855e0226dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc_2.6.15-25.43_powerpc.deb
      Size/MD5: 22239368 6e6ab2e662fa6ae523405b3cdbbf5b75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    17778 81083046a3098eebd7c8cad5a0faade1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    17380 cc27dffb7e1a52c71356d1e7b257bcf2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   261136 e7086a2889516c7d17d102f071b56967
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   282374 2a1f96e6985f667e6d885837d1a41a8e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   227450 3fb1cd1ea3d9f94fc1455da97fa2da99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   248680 aa8403e20976904b3353011864874b3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1048440 daf2d76379b29cb0d541017b2f798f4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1048604 822381057586dc85380674677dab1472
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1613952 83bd870b39d0969db2be991abdc8b93d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1742986 77eaa8d11058dbd0fc402bf0bea7c9f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   250840 f67a8c3647698c0105b6428c828d3eb4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   233590 25447e00f3583bb849ea493d38dddd5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    13030 5d5db387c0cf26a48427e686683a89b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    13518 eb0d22b53f99574edde2180d74c2e521
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    84830 e299c3344678891b0c15f5ebf8cd098a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    52200 698e0e885c08001128cac795580adee8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    73926 155a5dc4793be655c294a7f3d39ec6dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    85838 7b22c39eaf37f1e41498cf0cbf8540c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     6616 f6de3fe070052c2e50419f2fff5c0fc5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     7054 6e6f1d3af07a422e64bc554551100e92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    60350 701daa37b28d00b407fa76e3abbd5740
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    70340 0440e15199b7848c8ed61b2bdb2882d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   128542 f8e34a52912d5285f02828b13584f696
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   157792 5bab493344ae46a9b3df7f3823457725
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    98860 d83a7feb0ef659e9bedcc26df0cdd16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   113410 00bc703b6709c348be439bd11c46802f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    87246 0c171f3236189675b9a696d6dec2875e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    93266 003e03470d2abf5f01828e9ae9c10a55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  2014976 fd00a281cfb41f77750e0255fd79e7d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1988776 d4aac0add83d73b30ac16c41c515d4eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   104106 f17e7d666efae605490b74ebbcbf60b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   115712 45b06381ddb0439d7a990d558696ad58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    12738 cd2457f9a71129d5562e43953210bd94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    14438 6ebe59fa0c35ca85961c2c60a729e862
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    39944 46beddacbcaad812036ea2ae83304870
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    41474 4babf9e0e3e7045118381a2d41f69363
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   148956 f0ebd53c68a7506531dcbba82c6f2056
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   167576 e4814de3fb38a5ca3fcc3cbbaf6c165f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    42180 753e03b346c615d74bca769f772a170e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    44782 51e8b6f55b5079d70b780dc76e1455fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   320286 901810126bfdd12898079fdfe42afb1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   324708 66d39b3869725a185b9820e6556b48de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23460 19544e6b3fd48111ff45b92fb27ee30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23396 fb1f77bc33f02624a0580aafbb359f0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23458 b9115c2bf2f8d0e47d7000dd027fbbe2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23396 27d848a39bd8608ba14526ba09e79730
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23416 fdf9ff4efbafe1dcddae0ca84c58e42c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23426 552617cd354016e19d22cde094c27f54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23350 4574c742184f09feeabeed2e5d98d67b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23458 74669c0c3c5defabab5b56954a316dee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23388 95289d6bf39c291a518d4c5806d50f2d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 7684c29de740fa27c98c4a5cbc1366f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23388 afc3dbdd9891df599e390190d3450e21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23414 52179494e250d129fa119985beed1f75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23420 d6e5aa0c0dc1a12a82615c7b8ba5c98a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23346 66877044add2d0aebbda7a184535881a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 2b45943741dd7af5aa6a0d7463b42d73
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23390 ea3dc64d743738a893d50f3cccb9ee0b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 e60ce27af7998255a7fc39186088294c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23392 0eac7d5aef3e8d4c0e7f9b7dbbae28ca
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23428 6c94c32784b35b16ca7dadee22a7991c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23424 9d353b900b956b53349b82db5464bf2c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23360 6baaca22ebf1de91a5a19c1cbd2a87db
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-powerpc-smp_2.6.15.11-2_powerpc.deb
      Size/MD5:  1339334 524f7410c1746fe27fddcd5f73dafcdc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-powerpc_2.6.15.11-2_powerpc.deb
      Size/MD5:  1335366 7eab1b03ae6f0caaf8f287eaa15c95ef
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23444 a21dee0187c0a9859209ddc35641d978
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23376 4def5627e2af081233ed55275afb0dc9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-powerpc-di_2.6.15.11-2_powerpc.udeb
      Size/MD5:   799410 8d4e004017a5b30e7cf934a71a5995b2
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-powerpc-di_2.6.15.11-2_powerpc.udeb
      Size/MD5:   508178 7b08d3eaf48e07a05288d1ac9d1678a1

    

- 漏洞信息 (F47549)

Debian Linux Security Advisory 1097-1 (PacketStormID:F47549)
2006-06-21 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2006-0038,CVE-2006-0039,CVE-2006-0741,CVE-2006-0742,CVE-2006-1056,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857,CVE-2006-1858,CVE-2006-1864,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Debian Security Advisory 1097-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1097-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 14th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.4.27
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742
                 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368
                 CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274
Debian Bug     : 

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of
    kernel memory by exploiting a race condition. Like CVE-2006-0038,
    it requires CAP_NET_ADMIN privileges.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad ELF entry
    address.

CVE-2006-0742

    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1343

    Pavel Kankovsky reported the existance of a potential information leak
    resulting from the failure to initialize sin.sin_zero in the IPv4 socket
    code.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove() function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.



The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.4.27-10sarge3
     Alpha architecture          2.4.27-10sarge3
     ARM architecture            2.4.27-2sarge3
     Intel IA-32 architecture    2.4.27-10sarge3
     Intel IA-64 architecture    2.4.27-10sarge3
     Motorola 680x0 architecture 2.4.27-3sarge3
     Big endian MIPS             2.4.27-10.sarge3.040815-1
     Little endian MIPS          2.4.27-10.sarge3.040815-1
     PowerPC architecture        2.4.27-10sarge3
     IBM S/390 architecture      2.4.27-2sarge3
     Sun Sparc architecture      2.4.27-9sarge3

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2
     kernel-image-2.4.27-speakup 2.4.27-1.1sarge2
     mindi-kernel                2.4.27-2sarge2
     systemimager                3.2.3-6sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      831 fac953b669c78c37ea181597402b1c1b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    98672 717a42fcf8a6b67690a756b9f3f00aa1
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.diff.gz
      Size/MD5 checksum:     3962 fc1912f815afb314558fbadae87e43fc
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.tar.gz
      Size/MD5 checksum:    26319 368860bca1219d5777ab12dbc0713985
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1139 47ebcb365d37d7321eeee65b23920a29
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.dsc
      Size/MD5 checksum:      621 096115eaec61120211e0ba317b92def9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:    31646 1673537490a1af1a72ff1d65cd73139d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc
      Size/MD5 checksum:      876 2340c14db87e56a98e01dd17b095b7d4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
      Size/MD5 checksum:    21264 932ad64503240eedef626a0856fe5665
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1143 60abbaf01fa8d0f6ac0992eb08cb965e
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.dsc
      Size/MD5 checksum:      732 738178383acc2853cf8bd8b15861dc52
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.tar.gz
      Size/MD5 checksum: 15975839 9d7e6b12846c71e4d530375aacd1390b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:     9362 52942076ea9989d63ec619d0be8f324c
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      900 6a5fd70b803f4a0996b994d72d30c65e
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
      Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
      Size/MD5 checksum:     1051 e28f324bd15f8825721c36d2ad685f8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz
      Size/MD5 checksum:    11080 2813b0290efcd984fef6a69d9ca3c8e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:  1463783 1df6018893f9772d156ccf8e3080fb2b
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.+gz
      Size/MD5 checksum:   309066 ccf2db5585e30dd27b9eaf8d74285e70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      839 2f9746e3d73001a774607a2e8460dec8
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.dsc
      Size/MD5 checksum:      750 621fb9f1f76dc3fae5ed69f393ded2cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    54501 650afb6ddf33bd3c55d036c6e163f8d1
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
      Size/MD5 checksum:   741011 dc1085a42970fbb6f5174f8dae7f5bb2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1581 a0f54f9d6f61b4a31bdf49b2efa6a2ca
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.tar.gz
      Size/MD5 checksum:    17809 946929349518ac3d91c42825bfb6cabc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    31177 2d05a7a176dba04f37719199efa494b7
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
      Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      831 4aa4330d08a7829fbe9a548d1d8bab2f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
      Size/MD5 checksum:     1074 ef1ed7e19152004e160a48d320fed490
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.dsc
      Size/MD5 checksum:     1012 271d488ce319e95d567143228330e9a1


  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30482 64658643dc4a9554a722ff1b724c916f
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  4759092 15c5bd7f61d7291f1267c12733ffcb5b
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum: 31033502 47eb2bd29ad34555156eac2ec8160cd4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:    26664 88c43bac04065e47b6486bed94692e9e
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:  3580108 9542a6368e1668c0b3dd5529ba9c80f0
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   116802 a73dc8e6bb5119c7679d97d13b94cbc8
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30730 7cafd2b593e33cd0cb1ed5577a63142a
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge2_all.deb
      Size/MD5 checksum:  2419762 5e9e5072a78be7f12f2a499ee1116268
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    15944 00be5d0f60f2e89dec74ec2a76310638
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:   689772 9054c12e58f6b8c6d7f6055e94e3e2b3
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   631336 01476ba30e300b6b91a9a1a5d5c7f16b
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  9545000 c225981a19829b44b8b2e61beea177c2

 
  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge3_alpha.+deb
      Size/MD5 checksum:   272284 56ec516e9425c915a04a2a7184d15192
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge3_alpha.de+b
      Size/MD5 checksum: 16521602 4975ec76eb158179d36de7746cab88ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb      Size/MD5 checksum: 16966302 9bb2d088907ead2c2e689c139e945ef9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:  4573588 ad755c6e0a640be87f44d0eeb3cb0b9d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:     6930 5af591a1a57ca5b7b5ce7af39d0c30f8
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:   274064 b675644b9520620077d740f5033e311c


  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3145470 0e5c53017bbb7a84d554c1b6e60a0f6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3668438 2c00f060b5f4a599b1509e5625d766c1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  7331276 8ded6d50afd88d04fd9b601586509d32
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:   465160 61a35d05b6e9617ea9cec7ecc3ada43c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1692044 73cb9319b752cc5eaca4849e20edf6ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  4658994 b790e6512cd56ac98a1d9b5539c9d5b6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1056874 a03e9282e21db6a8094c8f2432a88e09


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12087676 c53fd67452bade39a41a4d07b1ddbd26
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   268890 b867a4d295e544fff9f5f0aa2a660762
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11713818 a039669989458b154e77063b9f2cd05e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_+i386.deb
      Size/MD5 checksum:   305120 bcbd70a2fc6c58ecf1ff373e398069bd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   300776 cba2acbaa7a11221bf20476dec02cc2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12340196 bb4547bd7a55cf5a863faf0eb787af72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:     9460 a52b72284e9b2ac4ea7249b9889dae97
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   293320 0cfddb9db531337f9220c787e2916002
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   299132 cf2755d7c9628bf753d4f9fc59df37f6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12682330 64e091ae35b42450a3f0af1af1b1cc17
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298354 03343347f66f3ebae64348769a8e7085
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298796 d5474dcad0aa041fa1bebffa5531a4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   298168 29f6f0af6edcc6fdc7b34fd33b4b45a6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   298236 251b20906cabdabc2689f8fad6238485
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11049672 7c1d176724d5af7ef5d92cf91a4b3a24
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.de+b
      Size/MD5 checksum:   300914 012fa2195bea70f63022c38ee8ece1b8
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2_i386.deb
      Size/MD5 checksum: 11992030 37b9f69b34c25ffd7f79c3dccb1c2b86
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:  1824238 b412dad8e3fa8ffbb88f9e24b720682c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   293678 293d14c82e8f2dc12d75d9ffbf07a497
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge2_i386.de+b
      Size/MD5 checksum:  4771964 810af192d449f6437de9c7b92bfc8f70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12420578 5699a644c8305231c6ff00ca615bc79a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   299016 8269e91daebb2aca7b360c15a41fa060
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12024800 595b16fd83e6ca0ca9b3b4df82934f72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   287484 80953396a754c47e76dc9c034fb2caab
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2_i386.deb
      Size/MD5 checksum:  7766984 0f4f4f9d1a0bc59ae4a2bf51734cfdfa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   299566 6165de4b3a2f79b3983d826f490f6c58
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb
      Size/MD5 checksum: 11303960 3519c2d9f88bcbbe6cd1a793bc21a092


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia+64.deb
      Size/MD5 checksum:   241990 1de0bc8938c45fdc763edc8b5be16dbb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.d+eb
      Size/MD5 checksum:   240416 d711a15e48958eaf0b0cffdb9afbe33b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb      Size/MD5 checksum: 16623356 6f87ed371e352b5ef736eeb9aea9b1e3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.+deb
      Size/MD5 checksum: 17020414 9748928c4403f7d1f708e4f1659ee56b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia6+4.deb
      Size/MD5 checksum:   241792 3f041268f31bbc7c13bb41f4b9b254d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64+.deb
      Size/MD5 checksum: 16980154 c21794a39eae3611d166574bc4d6c946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6188 510517c085a54b7f62b21fa549a28254
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6154 0ffa2668983b76eb117180f4127f443f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum: 16670542 5a5fc027a7ed1ea22de65134816ac27e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6372 9091687f1ccdd0a95238d4d8bf7a36b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6150 6862682a204020d9be7c3c7a24b58022
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:  4688294 fec3cf9e850845e1339b39eaadbfe411
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge3_ia64.de+b
      Size/MD5 checksum:   240852 525e38de6f834e7112097c26da92b929
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6178 c756f53c98ab21e53f097b2859433591


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2395830 74f11a8ca02e8a1cc776bf950e1d346b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2476584 4baad67d5c9bac3ee608a1f5b1d4dce0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2638370 76fcbcdc52016ae4feeafa765a3fc761
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2261274 baacace88b258a02d89ee5158269dc90
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2324432 202215777ec6ddca992a02551578bd20
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2543516 00b54f06d0e048692fec00cc8f888cf3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb      Size/MD5 checksum:  2395344 9326ce159e507c20e26fc4aa4ec9fa61


  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3852294 0b6ccfb76fed8400f453953d7421c2a6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3849540 57d70bee7ad3a52c2e41296a4b660748
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.de+b
      Size/MD5 checksum:  4681678 76bfca90e34781e213f64d92e412f7d2
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mips.deb
      Size/MD5 checksum:  7177648 16b29faa543ea16b0f0b1e4b79bcca92
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
      Size/MD5 checksum:    19330 f81dbe5f0089f55ccffdb5160fc14529


  Little endian MIPS architecture:
 

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mipsel.deb
      Size/MD5 checksum:  7040154 219d79c89034cc245aaedcc09c077253
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
      Size/MD5 checksum:    19372 f882ee84e76926b99370922778731da6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  3031408 2e21dc55f4e6c7d8e31485cab88b52a9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  2991822 83720b4706c20d32513fdc764e19a3db
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.+deb
      Size/MD5 checksum:  4686362 1e70d957d920f262ad64af693ead756d
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-+1_mipsel.deb
      Size/MD5 checksum:  4102944 4dcc900ca58f7d7e69f0020bb3237dda
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1+_mipsel.deb
      Size/MD5 checksum:  2137112 45fe0699fea23090cc4bc9368c6060e9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_m+ipsel.deb
      Size/MD5 checksum:  4670600 64746373b5c99a31c486fb360ec9048c
 

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:   155366 c357bb9b9fe6ce282b9bba63a0bdaec4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum: 13478728 3e7a96afb9b6bb0618a69d490d3df3e6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge3_powerp+c.deb
      Size/MD5 checksum:  4800960 668fb5a82d4ac36e66da1abff65e531f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum: 12750476 7f6aa3d1cc7c8990cf5ca2d8f5d5c128
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:     9868 61edb2922c82b932b5a51aabd4e3e962
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:    66712 0f1a666913413ccac067b519949b64be
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge3_powerpc.d+eb
      Size/MD5 checksum:  4683234 1dc1ed36b3052d676aece64519c79067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:   141276 627427945710a84e25f9a6e81cf52871
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:  1817290 168aae93e0888603a192acfb55c17ea4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:  2499398 6c3464992e5fd4f0c76bd6e456603b69
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum:   155380 29ef8c314e3ff4ad80a159e336f30cdd
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:   141508 23beb8633e1bc6c71cd7c85549ddc547
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:  4693350 489de2e942db258045c9a759940ae7a7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:     9944 b5f469592bb45ae907c251aa762e5cdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum: 13785644 b44ad17d6469962e8ad89a36e0069b0a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum:   155614 df66fe84dfcd04edc663ecfc295d5a60


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge3_s390.deb      Size/MD5 checksum:   993502 707589c970f190bed95035dad442b9d3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  4578888 53c705bdfebbd3e6985807f041e94612
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2970498 9c2e84a24bb629db2544929cf19f2087
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2778530 d7d6115aa9292ff635476cd2b17bf499


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:  2024732 192d85db979604781d849025a1f44ef2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  6546074 5865128021dbbc98f9a6c20e6fc574d9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  6379672 b308de13ac8b140e4a4d06ccd500b9e6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  3787334 543e98f2a917fbc57bf8a02c580491eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   165654 db2c3fd02eb51afbc1ccc98152a25784
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   202328 7df862f501733bef8450ba2bacc97b2a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   203806 5f0bc79951ced443e6ef009010b679f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   163860 ccb65e6e653600dfdbe81fb9f0839789
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:     9496 00a3aaa8a2c3cb84274e1155d0663fd1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  3601802 050ad637bd78c94c8819e553a50b51ae


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEkE03Xm3vHE4uyloRAgWkAKCizwMprLUoRTgrm24rKhy0Aq2KBgCfXUZW
VtJv32nxyaV0CN7g+A8yj7o=
=Y5TI
-----END PGP SIGNATURE-----

    

- 漏洞信息

24040
Linux Kernel Netfilter do_replace() Function Local Overflow
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-02-04 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.6.16 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel Netfilter Do_Replace Local Buffer Overflow Vulnerability
Boundary Condition Error 17178
No Yes
2006-03-21 12:00:00 2007-02-05 04:58:00
Solar Designer discovered this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
TransSoft Broker FTP Server 8.0
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Linux kernel 2.6.16 -rc1
Linux kernel 2.6.15 .6
Linux kernel 2.6.15 .4
Linux kernel 2.6.15 .3
Linux kernel 2.6.15 .2
Linux kernel 2.6.15 .1
Linux kernel 2.6.15 -rc3
Linux kernel 2.6.15 -rc2
Linux kernel 2.6.15 -rc1
Linux kernel 2.6.15
Linux kernel 2.6.14 .5
Linux kernel 2.6.14 .4
Linux kernel 2.6.14 .3
Linux kernel 2.6.14 .2
Linux kernel 2.6.14 .1
Linux kernel 2.6.14 -rc4
Linux kernel 2.6.14 -rc3
Linux kernel 2.6.14 -rc2
Linux kernel 2.6.14 -rc1
Linux kernel 2.6.14
Linux kernel 2.6.13 .4
Linux kernel 2.6.13 .3
Linux kernel 2.6.13 .2
Linux kernel 2.6.13 .1
Linux kernel 2.6.13 -rc7
Linux kernel 2.6.13 -rc6
Linux kernel 2.6.13 -rc4
Linux kernel 2.6.13 -rc1
Linux kernel 2.6.13
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
+ Red Hat Fedora Core4
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.6.15.5
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8710 CM 3.1
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8700 CM 3.1
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8500 CM 3.1
Avaya S8500 0
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya S8300 CM 3.1
Avaya S8300 0
Avaya Messaging Storage Server MM3.0
Avaya Converged Communications Server 2.0
Linux kernel 2.6.16

- 不受影响的程序版本

Linux kernel 2.6.16

- 漏洞讨论

The Linux kernel is prone to a local buffer-overflow vulnerability because the kernel fails to properly bounds-check user-supplied input before using it in a memory copy operation.

Exploiting this issue allows local attackers to overwrite kernel memory with arbitrary data, potentially allowing them to execute malicious machine code in the context of affected kernels. This vulnerability facilitates the complete compromise of affected computers.

This issue is exploitable only by local users who have superuser privileges or have the CAP_NET_ADMIN capability. This issue is therefore a security concern only if computers run virtualization software that allows users to have superuser access to guest operating systems or if the CAP_NET_ADMIN capability is given to untrusted users.

Linux kernel versions prior to 2.6.16 in the 2.6 series are affected by this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Linux kernel version 2.6.16 has been released to address this issue.

Please see the referenced vendor advisories for more information.


Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test11

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6

Linux kernel 2.6 -test3

Linux kernel 2.6 .10

Linux kernel 2.6 -test5

Linux kernel 2.6 -test1

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test8

Linux kernel 2.6.1 -rc1

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.10 rc2

Linux kernel 2.6.11

Linux kernel 2.6.11 .6

Linux kernel 2.6.11 .12

Linux kernel 2.6.11 -rc2

Linux kernel 2.6.11 .5

Linux kernel 2.6.11 -rc3

Linux kernel 2.6.12 .4

Linux kernel 2.6.12 .3

Linux kernel 2.6.12 .1

Linux kernel 2.6.12 .5

Linux kernel 2.6.12 -rc4

Linux kernel 2.6.12 .2

Linux kernel 2.6.12 .6

Linux kernel 2.6.12 -rc5

Linux kernel 2.6.13 -rc4

Linux kernel 2.6.13 .3

Linux kernel 2.6.13

Linux kernel 2.6.13 -rc7

Linux kernel 2.6.13 -rc1

Linux kernel 2.6.13 .2

Linux kernel 2.6.14 -rc2

Linux kernel 2.6.14 .5

Linux kernel 2.6.14 .4

Linux kernel 2.6.14 -rc3

Linux kernel 2.6.14

Linux kernel 2.6.14 -rc1

Linux kernel 2.6.14 -rc4

Linux kernel 2.6.14 .2

Linux kernel 2.6.15

Linux kernel 2.6.15 -rc1

Linux kernel 2.6.15 .2

Linux kernel 2.6.15 -rc3

Linux kernel 2.6.15 .1

Linux kernel 2.6.15 .4

Linux kernel 2.6.15 .3

Linux kernel 2.6.15 -rc2

Linux kernel 2.6.16 -rc1

Linux kernel 2.6.2

Linux kernel 2.6.4

Linux kernel 2.6.7 rc1

Linux kernel 2.6.7

Linux kernel 2.6.8 rc3

Linux kernel 2.6.8 rc2

Linux kernel 2.6.8 rc1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站