CVE-2006-0039
CVSS4.7
发布时间 :2006-05-19 18:02:00
修订时间 :2011-03-07 21:29:12
NMCOPS    

[原文]Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.


[CNNVD]Linux Kernel Netfilter Do_Add_Counters 本地竞态条件漏洞(CNNVD-200605-372)

        Linux kernel 2.6.16的netfilter中的do_add_counters函数存在竞态条件。具备CAP_NET_ADMIN能力的本地用户可以通过触发竞态条件以产生与分配内存不符的尺寸值,导致IPT_ENTRY_ITERATE内的缓冲区通读,从而读取内核内存。

- CVSS (基础分值)

CVSS分值: 4.7 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-362 [使用共享资源的并发执行不恰当同步问题(竞争条件)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10309Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to re...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0039
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0039
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-372
(官方数据源) CNNVD

- 其它链接及资源

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2722971cbe831117686039d5c334f2c0f560be13
(PATCH)  MISC  http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2722971cbe831117686039d5c334f2c0f560be13
http://bugs.gentoo.org/show_bug.cgi?id=133465
(PATCH)  CONFIRM  http://bugs.gentoo.org/show_bug.cgi?id=133465
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191698
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191698
http://xforce.iss.net/xforce/xfdb/26583
(UNKNOWN)  XF  linux-doaddcounters-race-condition(26583)
http://www.vupen.com/english/advisories/2006/2554
(UNKNOWN)  VUPEN  ADV-2006-2554
http://www.vupen.com/english/advisories/2006/1893
(UNKNOWN)  VUPEN  ADV-2006-1893
http://www.ubuntu.com/usn/usn-311-1
(UNKNOWN)  UBUNTU  USN-311-1
http://www.securityfocus.com/bid/18113
(UNKNOWN)  BID  18113
http://www.redhat.com/support/errata/RHSA-2006-0689.html
(UNKNOWN)  REDHAT  RHSA-2006:0689
http://www.osvdb.org/25697
(UNKNOWN)  OSVDB  25697
http://www.debian.org/security/2006/dsa-1103
(UNKNOWN)  DEBIAN  DSA-1103
http://www.debian.org/security/2006/dsa-1097
(UNKNOWN)  DEBIAN  DSA-1097
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
http://secunia.com/advisories/22945
(UNKNOWN)  SECUNIA  22945
http://secunia.com/advisories/22292
(UNKNOWN)  SECUNIA  22292
http://secunia.com/advisories/21476
(UNKNOWN)  SECUNIA  21476
http://secunia.com/advisories/20991
(UNKNOWN)  SECUNIA  20991
http://secunia.com/advisories/20914
(UNKNOWN)  SECUNIA  20914
http://secunia.com/advisories/20671
(UNKNOWN)  SECUNIA  20671
http://secunia.com/advisories/20185
(UNKNOWN)  SECUNIA  20185
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17
(UNKNOWN)  CONFIRM  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17

- 漏洞信息

Linux Kernel Netfilter Do_Add_Counters 本地竞态条件漏洞
中危 竞争条件
2006-05-19 00:00:00 2006-05-22 00:00:00
本地  
        Linux kernel 2.6.16的netfilter中的do_add_counters函数存在竞态条件。具备CAP_NET_ADMIN能力的本地用户可以通过触发竞态条件以产生与分配内存不符的尺寸值,导致IPT_ENTRY_ITERATE内的缓冲区通读,从而读取内核内存。

- 公告与补丁

        暂无数据

- 漏洞信息 (F48181)

Ubuntu Security Notice 311-1 (PacketStormID:F48181)
2006-07-12 00:00:00
Ubuntu  security.ubuntu.com
advisory,arbitrary,kernel,local,root
linux,osx,ubuntu
CVE-2006-0039,CVE-2006-2445,CVE-2006-2448,CVE-2006-2451
[点击下载]

Ubuntu Security Notice 311-1 - A race condition was discovered in the do_add_counters() functions. Processes which do not run with full root privileges, but have the CAP_NET_ADMIN capability can exploit this to crash the machine or read a random piece of kernel memory. In Ubuntu there are no packages that are affected by this, so this can only be an issue for you if you use third-party software that uses Linux capabilities. John Stultz discovered a faulty BUG_ON trigger in the handling of POSIX timers. A local attacker could exploit this to trigger a kernel oops and crash the machine. Dave Jones discovered that the PowerPC kernel did not perform certain required access_ok() checks. A local user could exploit this to read arbitrary kernel memory and crash the kernel on 64-bit systems, and possibly read arbitrary kernel memory on 32-bit systems. A design flaw was discovered in the prctl(PR_SET_DUMPABLE, ...) system call, which allowed a local user to have core dumps created in a directory he could not normally write to. This could be exploited to drain available disk space on system partitions, or, under some circumstances, to execute arbitrary code with full root privileges. This flaw only affects Ubuntu 6.06 LTS.

=========================================================== 
Ubuntu Security Notice USN-311-1              July 11, 2006
linux-source-2.6.10/-2.6.12/-2.6.15 vulnerabilities
CVE-2006-0039, CVE-2006-2445, CVE-2006-2448, CVE-2006-2451
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  linux-image-2.6.10-6-386              2.6.10-34.21
  linux-image-2.6.10-6-686              2.6.10-34.21
  linux-image-2.6.10-6-686-smp          2.6.10-34.21
  linux-image-2.6.10-6-amd64-generic    2.6.10-34.21
  linux-image-2.6.10-6-amd64-k8         2.6.10-34.21
  linux-image-2.6.10-6-amd64-k8-smp     2.6.10-34.21
  linux-image-2.6.10-6-amd64-xeon       2.6.10-34.21
  linux-image-2.6.10-6-hppa32           2.6.10-34.21
  linux-image-2.6.10-6-hppa32-smp       2.6.10-34.21
  linux-image-2.6.10-6-hppa64           2.6.10-34.21
  linux-image-2.6.10-6-hppa64-smp       2.6.10-34.21
  linux-image-2.6.10-6-itanium          2.6.10-34.21
  linux-image-2.6.10-6-itanium-smp      2.6.10-34.21
  linux-image-2.6.10-6-k7               2.6.10-34.21
  linux-image-2.6.10-6-k7-smp           2.6.10-34.21
  linux-image-2.6.10-6-mckinley         2.6.10-34.21
  linux-image-2.6.10-6-mckinley-smp     2.6.10-34.21
  linux-image-2.6.10-6-power3           2.6.10-34.21
  linux-image-2.6.10-6-power3-smp       2.6.10-34.21
  linux-image-2.6.10-6-power4           2.6.10-34.21
  linux-image-2.6.10-6-power4-smp       2.6.10-34.21
  linux-image-2.6.10-6-powerpc          2.6.10-34.21
  linux-image-2.6.10-6-powerpc-smp      2.6.10-34.21
  linux-image-2.6.10-6-sparc64          2.6.10-34.21
  linux-image-2.6.10-6-sparc64-smp      2.6.10-34.21
  linux-patch-ubuntu-2.6.10             2.6.10-34.21

Ubuntu 5.10:
  linux-image-2.6.12-10-386             2.6.12-10.35
  linux-image-2.6.12-10-686             2.6.12-10.35
  linux-image-2.6.12-10-686-smp         2.6.12-10.35
  linux-image-2.6.12-10-amd64-generic   2.6.12-10.35
  linux-image-2.6.12-10-amd64-k8        2.6.12-10.35
  linux-image-2.6.12-10-amd64-k8-smp    2.6.12-10.35
  linux-image-2.6.12-10-amd64-xeon      2.6.12-10.35
  linux-image-2.6.12-10-hppa32          2.6.12-10.35
  linux-image-2.6.12-10-hppa32-smp      2.6.12-10.35
  linux-image-2.6.12-10-hppa64          2.6.12-10.35
  linux-image-2.6.12-10-hppa64-smp      2.6.12-10.35
  linux-image-2.6.12-10-iseries-smp     2.6.12-10.35
  linux-image-2.6.12-10-itanium         2.6.12-10.35
  linux-image-2.6.12-10-itanium-smp     2.6.12-10.35
  linux-image-2.6.12-10-k7              2.6.12-10.35
  linux-image-2.6.12-10-k7-smp          2.6.12-10.35
  linux-image-2.6.12-10-mckinley        2.6.12-10.35
  linux-image-2.6.12-10-mckinley-smp    2.6.12-10.35
  linux-image-2.6.12-10-powerpc         2.6.12-10.35
  linux-image-2.6.12-10-powerpc-smp     2.6.12-10.35
  linux-image-2.6.12-10-powerpc64-smp   2.6.12-10.35
  linux-image-2.6.12-10-sparc64         2.6.12-10.35
  linux-image-2.6.12-10-sparc64-smp     2.6.12-10.35
  linux-patch-ubuntu-2.6.12             2.6.12-10.35

Ubuntu 6.06 LTS:
  linux-image-2.6.15-26-386             2.6.15-26.44
  linux-image-2.6.15-26-686             2.6.15-26.44
  linux-image-2.6.15-26-amd64-generic   2.6.15-26.44
  linux-image-2.6.15-26-amd64-k8        2.6.15-26.44
  linux-image-2.6.15-26-amd64-server    2.6.15-26.44
  linux-image-2.6.15-26-amd64-xeon      2.6.15-26.44
  linux-image-2.6.15-26-hppa32          2.6.15-26.44
  linux-image-2.6.15-26-hppa32-smp      2.6.15-26.44
  linux-image-2.6.15-26-hppa64          2.6.15-26.44
  linux-image-2.6.15-26-hppa64-smp      2.6.15-26.44
  linux-image-2.6.15-26-itanium         2.6.15-26.44
  linux-image-2.6.15-26-itanium-smp     2.6.15-26.44
  linux-image-2.6.15-26-k7              2.6.15-26.44
  linux-image-2.6.15-26-mckinley        2.6.15-26.44
  linux-image-2.6.15-26-mckinley-smp    2.6.15-26.44
  linux-image-2.6.15-26-powerpc         2.6.15-26.44
  linux-image-2.6.15-26-powerpc-smp     2.6.15-26.44
  linux-image-2.6.15-26-powerpc64-smp   2.6.15-26.44
  linux-image-2.6.15-26-server          2.6.15-26.44
  linux-image-2.6.15-26-server-bigiron  2.6.15-26.44
  linux-image-2.6.15-26-sparc64         2.6.15-26.44
  linux-image-2.6.15-26-sparc64-smp     2.6.15-26.44

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel
update has been given a new version number, which requires you to
recompile and reinstall all third party kernel modules you might have
installed. If you use linux-restricted-modules, you have to update
that package as well to get modules which work with the new kernel
version. Unless you manually uninstalled the standard kernel
metapackages (linux-386, linux-powerpc, linux-amd64-generic), a
standard system upgrade will automatically perform this as well.

Details follow:

A race condition was discovered in the do_add_counters() functions.
Processes which do not run with full root privileges, but have the
CAP_NET_ADMIN capability can exploit this to crash the machine or read
a random piece of kernel memory.  In Ubuntu there are no packages that
are affected by this, so this can only be an issue for you if you use
third-party software that uses Linux capabilities. (CVE-2006-0039)

John Stultz discovered a faulty BUG_ON trigger in the handling of
POSIX timers. A local attacker could exploit this to trigger a kernel
oops and crash the machine. (CVE-2006-2445)

Dave Jones discovered that the PowerPC kernel did not perform certain
required access_ok() checks. A local user could exploit this to read
arbitrary kernel memory and crash the kernel on 64-bit systems, and
possibly read arbitrary kernel memory on 32-bit systems.
(CVE-2006-2448)

A design flaw was discovered in the prctl(PR_SET_DUMPABLE, ...) system
call, which allowed a local user to have core dumps created in a
directory he could not normally write to. This could be exploited to
drain available disk space on system partitions, or, under some
circumstances, to execute arbitrary code with full root privileges.
This flaw only affects Ubuntu 6.06 LTS.  (CVE-2006-2451)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.21.diff.gz
      Size/MD5:  6124454 27bad9c346071eebe1cf33c506468e83
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.21.dsc
      Size/MD5:     2509 279c255c0ac6a6ffbe7ecc83e985e04d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.21_all.deb
      Size/MD5:  6783620 1fcd5c3cc052552266f31b10f8f295f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.21_all.deb
      Size/MD5: 37516932 d5a38ddd3de66a14f3b79e25e9bccec1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.21_all.deb
      Size/MD5:   506436 19fa4169a3742fce42e4aa8f43d63387

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    20832 80ccedd704f263cb347ccba1dfcc6330
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    47398 1453b4759c87b4a370441e43f5d24062
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    88900 2681ffd109cf558229ca5e029800ad5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    30022 f6d4ed3e55efea23574ed46b35b1cbb2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    41248 03ce041ef8e67a4a21710d9b26e14d31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    73602 8fe6d0fd85efd7cd28a5fffe692e0cbf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:     5744 abf500a2ef269cb060cb4c1a8591a652
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    34854 30dea7ab1a58710901c7f7400bf6557b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    55182 864c8173f722e06a31040927acbb6ecb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   112960 9228e41d928be1e8da8031c5fa19a712
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    40824 0c905daa2a93cccb58684bf7b2a07cf4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   115720 77f7b53bb5a0f15c9f2f86c41ec7ab96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   174642 6a513dd4c217145c1b563ce6801f0847
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    82590 4859c50443b48b625589d8da4c20af56
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:  1467826 6e4776f0539b1c6f455b71f33bc06a3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-generic_2.6.10-34.21_amd64.deb
      Size/MD5:   287830 a334ad162ff21120d8b796cd25c49295
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8-smp_2.6.10-34.21_amd64.deb
      Size/MD5:   284906 68650921045a52d19bc2bef57aea9db1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8_2.6.10-34.21_amd64.deb
      Size/MD5:   286702 9f00f6029c1a2b114cc19bc8bd6a50c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-xeon_2.6.10-34.21_amd64.deb
      Size/MD5:   282426 58a2cbe906b40bd2b1223c9e2485ebfb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.21_amd64.deb
      Size/MD5:  6140764 77e004c16ea59fc2c06f97f629997379
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-generic_2.6.10-34.21_amd64.deb
      Size/MD5: 14580844 909a97286d2cce866c192954d771643c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8-smp_2.6.10-34.21_amd64.deb
      Size/MD5: 15123216 2e51b2ddca63ce5cb2d5d7eb270ab277
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8_2.6.10-34.21_amd64.deb
      Size/MD5: 15093106 06ed05d09f6e5d237e611aeacfe7787e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-xeon_2.6.10-34.21_amd64.deb
      Size/MD5: 14964176 edd6cc980b9334c8c3830466cacd1e52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.21_amd64.deb
      Size/MD5:  1367906 60f5ef3b264ca1a109fb392e7959d28b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    14224 f34faf099bf88a25ec13d5c24561e696
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   178512 8657e062c05211470b19cd54144e303a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   174896 bf7b1d5be8a27552ba7f64338d3e1d07
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   731230 ea7eacc13ad99c1ffef202a391252f90
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   780886 58a7fde7a57f40164a9e5745303aa471
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   150048 16e502392e10e199e815bfc04f7bf4b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   168134 27248c45ce87fc61d3e94bb9cfb3c7a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:     9558 2a65002b5a1febc7c14a88e8c4041755
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    94864 e5c4b83aa6e0f69937a563c56ae90987
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    45730 2bae7f2c9dd3200909faa7a9ed1491c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    33168 e14740c6f9aac7ccbea43c33118f2a10
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    55294 ff1027e01fd36bd6b70840ea9e193e09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:     4672 e4700fe7d8f52008940fe72d3447f52a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:     7840 4b4b2d5869028f0e5730f593e0996979
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    53806 5c53815824d0f925c651204a9ea2ed63
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   111112 6f6063e84a660188f4f2a93faaf2fcf6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    10154 27b5393dc5be50dd6b7b092862e5a5b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    60466 6f4bca87caae92a4335d6892fc50cc71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   208568 9e0d16ffe2a85fa08f76799695df10f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    69270 e1427b46d124c6ccb83407a6c98b604f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   394804 5ae120b6f05d05c1a16bffba0d828a52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   294502 eab326447bb2aee5214e7746bbbe803b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    12074 9dcacd946c4f2f14d126550092af3f3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    22658 f97175b809befa94ae454c6d93978104
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    28804 4fa48ba7db585840b543f8daa5bacf02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    56794 e5b631d236c8c9d0f54ee1d400d8da58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:    34942 a08444576c3b66f863964b73d81a8401
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.21_amd64.udeb
      Size/MD5:   247472 3a144cb4ef09a8b9e036101b05522b36

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    18166 3a91fdb3f0d7063655b37c22f4fcefb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    44828 7550c9944280b8c48bd96e91a81e00dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   103054 73371133a263a221ab49a53b3d254f68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    86012 4ff41b25754e01e40094ce3962984773
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    29084 debca3172f610e2955ff06ff6277e57f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    39772 5d6bf7e4a20aa1cd96d9934574dec246
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    71156 dff0d431315a5bca7f24544e1d3d8d9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:     5502 88c7653577a979fca77608196966a004
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    31580 f1df6210daf42f549575a4f5fe1f9d73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    52946 5cbcafe9de5cb945dc058152e25bf01a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   104472 24a2875bf3fe82fd85c23dcfcc05fd14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    38624 001fe0029e718a1b7f61871bcc14a655
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   114522 6a83f107796afa087536593d44310b33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   190634 11c8b3db42a262c2d2fdd20e01e8a00e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    86544 9eff3d6ded8daf1e445f9a3517ededd8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:  1390234 be5072d98f6efaed5bc484007b247e3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-386_2.6.10-34.21_i386.deb
      Size/MD5:   316510 2a193e97fedcf3e5043acd884c11b777
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686-smp_2.6.10-34.21_i386.deb
      Size/MD5:   312258 1a39fe66b981b3c512035df8e4b163fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686_2.6.10-34.21_i386.deb
      Size/MD5:   314704 226110c9e7374c0b01d9ca2c6eaf3fb5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7-smp_2.6.10-34.21_i386.deb
      Size/MD5:   312522 fe2ada3af10425fcf61820fe5eba0b08
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7_2.6.10-34.21_i386.deb
      Size/MD5:   314574 a7a82624a0c774f6b0d1214bf574b6e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.21_i386.deb
      Size/MD5:  6138148 9c5db76f2ccab5446495825b94048794
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-386_2.6.10-34.21_i386.deb
      Size/MD5: 15613348 d7a7de0bc686ca66bc3484dcee8216c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686-smp_2.6.10-34.21_i386.deb
      Size/MD5: 16192678 9f2de80494635456d3d93187a1f35562
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686_2.6.10-34.21_i386.deb
      Size/MD5: 16610476 95cd8e0418cd108c8f3cdd219d151759
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7-smp_2.6.10-34.21_i386.deb
      Size/MD5: 16304892 7ba2161fed3a813ec12b3d3b157d7d5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7_2.6.10-34.21_i386.deb
      Size/MD5: 16672564 b84b142aa67bd83b79381dddd4bf6f47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.21_i386.deb
      Size/MD5:  1366824 30202d9a83a8fadde6a3b0c998da9a7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    14076 5d6d05ddb1c0d020750df5a05d4f20d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   183206 242b030e1cd033c9d272ccbbabad459f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   172784 98e526feca4779c6b1b060ff0e779877
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   967866 910ed3a3857ae2509bbdcd2d281bdef0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   780702 f351f3bb55c753dc933c16a4a2a83fbb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   140670 ac4476dc38775d64216f7afc707ad5ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   167942 70d16774c23ff3824e36103dca73945f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:     9350 4163d88e8a67fcb9cb37e5710604ff92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    89326 8fb8bcff2e5b1539528ec39993f1e9b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    48132 34e3bc20e8f31f1bf00665ad0259275e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    30886 2b1aecce04e99973dbe18d6e93ca4547
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    65898 b610e1d2ee4eea20ec251cce8f6e7c57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:     4504 2eb2c2a4d117eaa06050076c6ddbf0ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:     7754 5bb4f20c351ddf2943b5da3d15bba688
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    50778 82672e4c7c798e84b99b9bc6f9b08063
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   111590 d43cc11824c8039083067736b6dd378e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:     9888 069fe127c6ca4480e8d5ad0d1952e013
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    57150 07320874179e6489aade2956bdc24eb3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   242024 86f399887c4abd68930cad7f6ec7ec7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    66236 87dd7f5ca3c6e780571950fb7b45026c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   436590 5ee650e7410e272efade6e509630ad19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   485662 1729af116b8f4a6dfa235be7221e06d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    11470 ff67d485418756fc058c730352e50e8e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    21240 dcea20e31b972310532fca9c579e4f6a
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    29530 2cc8008495d33cb8262c344be3636032
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   106276 ce68373e14c5cb3138fdf3031b12026f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:    33824 9a563866d0e981f57f81d0af78ad025b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-386-di_2.6.10-34.21_i386.udeb
      Size/MD5:   261334 4dd43433f80c653eb79f1cabee2a6afc

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    24058 6d6f21bb738d3b6973aa728865fee4b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    24058 b3fb603c7c6fe99e000fd230cab53e5a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    24044 dff77fb6908080f29d225149ae786966
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    58280 dd4f01bee6033c165dd3e036ff2dbe48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    58278 b2beb9bdd62747f6476e69f222075fb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    58268 7d53108b88f56ca8f823fc8945492ac4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    30292 09fe7ba5f6f63d1917b2420cca554a85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    30290 d520f62898775e94c287412a349a50d9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    30270 3dc0e1102f329e75f4e76f54225369a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   109248 eac0ec8ea8503a30aaeb3dbdb41b5f63
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   109250 9146b91e32a3891ce646748f668a4927
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   109226 48908343cab523e6db06bffd28057e60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    35394 8174f52cf8d697a6edb1fba8bea61689
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    35398 8bbc66cd5b3e24062da940194ad66980
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    35380 34c869a0f3eeaf1507e68461bf1ff5bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    30936 4856142421d1bea6b59ef2626fa32c1f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    30934 b1cc71397175fd678e5697e4a4e38c16
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    30910 6f2412b9c2f051d51d0810f9a2a25a11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   212966 3486b38b8b38deb13d7ff6c341d40f30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   212952 30434b089b01062067845436ef5c979b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   212938 6d148f135ed6fe3b6ae75a347b4ef937
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     6164 ca2a471666692bcd7764983ceb79b483
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     6168 ab46eb0d398bf43cee23f404b27a3a31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     6152 5d0634f07fc25826a332aac7d27dde05
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    43432 fb725ba28466cc51a8313a3389abe67f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    43420 4ed372f9977970d6bbc769dd04a71fad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    43420 9aa7f21fbdda4cf35bc22378ceb4462c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     4584 5171a76ab4aca06742d2ee0098a06c28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     4588 6cfb2c03a17922bba6a419a8baba31a6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     4588 1122bb8e6dce343e06a53a7ec3300d61
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    66050 01d0c91bad4f60cf01ea6968753fd0ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    66038 cbf3e52f6dc680a77f841b990fd4d4d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    66032 960cb7fb302bc89bd81d2d887f66f6ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   117116 b38598a53e5a6da78c0fb02eb95a4108
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   117098 e6fcff649f0fc4661b5371af50f961b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   116852 8dcef1d311f6be0e0ac413d5395d6d69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    66652 bf5820116cfb6a552e91646203f81f45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    66642 940b4d02b085a683ca5a5c0756a01e58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    66630 077870d34771229d5670609fa2a91663
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   142052 db6c2028132add3e796ffc65eaa91af5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   142052 3d09fe7ef1ca2dbc722c95db6f98f37c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   142050 b2eb7f809165201e1607ebedcdd97b9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   213982 d5bad0bfc89d3454dfeea06cf5a3a3c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   213978 73e0856213e8bb70cb9dd6d9a9e2a62f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   213942 acaeb25f280cc601caa84a2becc92f10
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   107008 3bef7eea066796ae4c34ef49a1b72b79
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   107002 ca514e48e8712a7a5c84f28969e67858
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   107006 db5f57c078864a560ecd69a48e8a1e08
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:  1866838 b063417ad9f0755fa2d78abf35194620
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:  1871120 72b6d03267b0f5d29db4ff1d0a4c97c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:  1901494 23b2413e2b58ac002a3d45989bda88f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3-smp_2.6.10-34.21_powerpc.deb
      Size/MD5:   251624 7175a29ea0c2c586c85a210af1667c10
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3_2.6.10-34.21_powerpc.deb
      Size/MD5:   251008 002ff01c08c6da1b9ef29f6f88540a32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4-smp_2.6.10-34.21_powerpc.deb
      Size/MD5:   251320 243ff5c3813c5e19df0ddcfbaf7414aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4_2.6.10-34.21_powerpc.deb
      Size/MD5:   250874 c24e02befef94c7275e89b2e382aeeab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc-smp_2.6.10-34.21_powerpc.deb
      Size/MD5:   251786 d5f5fd4c8f6692334ede84b852dc6ebd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc_2.6.10-34.21_powerpc.deb
      Size/MD5:   252400 efa3249e10f8c1518e6e6d61428e17c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.21_powerpc.deb
      Size/MD5:  6158584 06bce4e7f906a73624c113c58d65c024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3-smp_2.6.10-34.21_powerpc.deb
      Size/MD5: 15648150 5be5be7a28f0e6acb47f0f1796da71c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3_2.6.10-34.21_powerpc.deb
      Size/MD5: 15211538 93bd69a3efaa1695e82adaf98cf98618
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4-smp_2.6.10-34.21_powerpc.deb
      Size/MD5: 15636552 04692ce0c5b327358ef0db3ea98be6ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4_2.6.10-34.21_powerpc.deb
      Size/MD5: 15205094 67f10dbf67d8a14c6a63cec632b17726
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc-smp_2.6.10-34.21_powerpc.deb
      Size/MD5: 15552444 669bee3ad8389e18f79dbf9ff95a73c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc_2.6.10-34.21_powerpc.deb
      Size/MD5: 15246782 c5fb287f3d6a39f0dc65e4368df3d597
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.21_powerpc.deb
      Size/MD5:  1366976 b424b9b7b56c372dfc714da0859a2961
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    17356 dc610e05cccc9f26a51b2fae14b70755
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    17354 6750459aa828de0bfac9c5d59d1e2dab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    17350 47635ca3b04e7a7979c3a8f0dedfc155
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   213720 3f0a4571a19244d56ced2200ac26ad2f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   213728 ae98e99ae388f34060b43ccd2af478c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   213454 57315e01ed6d53cb313e9987c38f775c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   210738 594c29a039faf1f07957ff2a60c558c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   210744 5e6e999804d544384645e745eefee330
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   210726 8303346b0fd12072bcc1f4efa3fb3fdf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   688482 12e5040c4af2007d00120b076e1c69fd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   688468 938c124e99d3032c679178e0659bc53c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   687020 455f0c2022b2a268f055a194563e75cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   780760 7290844ab67fe8733b0dc412506f0340
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   780746 e347b8b6902da32699f335e3508e84db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   780782 b5364443d8d7bcce4bf184280f668d95
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   511302 821d7d0dff2a507f7493acc5cc5ecd82
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   511272 787516562028db087052de38e5ba9729
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   510934 dde70400bb9e3cd49eead546d9e14cac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   257750 058416a202f80f6bf4b4bf3d3d895879
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   257762 b41b745229f34f0c2a22cbc0a9e230f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   256880 27b7e6440fafa889a3ec463b37cd9172
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    84430 de7d7bc4b2e0c82587a28502b919d591
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    84430 12028eed34338bdf915b59b380f1ce9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    84410 35f3fbc838e7367afa0cfd6e6f99f00b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    60988 6b7fd83a06d0230eb7d01d9b24a630f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    60994 a0d8eec73f3138add53063999064af89
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    60998 6ace4f91ccee18879f90f68a93c2b0c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    65008 f0041c6df98bad1e7ed959713a616096
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    64996 2ef85fad1f6cd21a73ce0121028dc87c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    65002 a2287f292c60496ee2653bed80cd06bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     5384 e5721651970869fa8455590f6cb9ebe2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     5374 2867c1fc2056453833ee6b3a6ccd7b33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:     5372 b50733b9464bfeef3ef95c4e21f7b6b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    63274 2b861e80cc4cbaa529eb2f3cab6863e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    63280 a5cacb1a6bf53336cd94640bf4a0d1ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    63220 e8201d855e8ae82dbe39d9fad807477e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   131654 45d54b86ba3e0aa0b7bc19bb248b5ecd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   131658 00ca0a2f54234683c22257bc177fcbf2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   131666 25ae1c959033da4e49cd46f533254954
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    70986 d5f9314ab76f8d43e836d498ef4ded19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    70980 8a9ce2cdb1dfaf8d8e1e9ffdb544b66c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    70972 d161b9a0d97d963701c269bcf53ae898
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   357330 53fc229d6842f2c8cb06ca778c5acf31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   357322 8dd11f78eec365c1da54fa563398454d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   357334 9e36f79e8a44a30a8614a0fdceb6a3c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    80736 29ecc0fe1fcba1ca7a2befdfa6515644
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    80734 18238b681e6095e9b10c1489d27c6359
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    80744 d404fe56baa692d7b99b66a92d390358
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   511008 321a879487afd1bb196976c887298ba7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   511006 5e9d488072d5bbf1419737ea732d1af9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   510808 66c8210d581dab35ddb66a2be41ac6b7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   389168 71db72445cc6a57e1912db7e16a2d311
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   389146 5930f3ccb29198a5c3f9350b1045c288
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   389012 9049694fa9b616dbc0db3defd1757bc9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    63152 e667e39870bd14e0dce5631b0d062e2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    63160 f30120c844c7b54f03fcab175f1d1d19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    63034 7e11c247901dcb462b15dad7224035d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    23346 1472bae9eb804aaf81a2df0c07cf0950
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    23348 5093a2fc8bb04029db3bbca9937182d9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    23108 6eea2143b11719be53bb0da21eb4087c
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    35382 c5426c25ba49fbac0df7c62994d24f1d
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    35378 46bfdfa61df348a6ff4ac2d90c315685
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    35372 9223827a3bf45545da15384dc6cc2681
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   135106 6e1fc6249399ec0ce9a2f091b350303f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   135086 688f2379314e71ef7e43bf99022ff9c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   135086 456574ded5e78c72ae699c4643cf4a6e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    42402 dee443ba515e12f14b00111496b42441
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    42388 5cf3d239d96622bdd07aa49ec4f741cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:    42402 8e01a8bf9e50d55349b12f0bba0abe57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power3-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   294762 a8cff73b9fa252b6c1f626024c691163
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power4-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   294754 7bd028fde9735fd8e1693d1abcc19d80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-powerpc-di_2.6.10-34.21_powerpc.udeb
      Size/MD5:   294758 5d8dd7827ebfe8371c77b690893ceb17

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.35.diff.gz
      Size/MD5:  7985390 e124962639df0ba3b840af21a4c2e8e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.35.dsc
      Size/MD5:     2514 f7ff6310f824c802a9bc924495af9ec0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12.orig.tar.gz
      Size/MD5: 47177098 9272115d4005d4e9773a1a6170fd20cd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-doc-2.6.12_2.6.12-10.35_all.deb
      Size/MD5:  4554592 3ef026aca31340e2bd6537e6ecee8fd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.35_all.deb
      Size/MD5: 40451510 c70355ce3d27269cf2d134f02508908d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-tree-2.6.12_2.6.12-10.35_all.deb
      Size/MD5:   377284 9e537259e82e2594dc1687b5426c4508

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    20804 481a11ca9cbfeeadf65d5669b2dd0d1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    45604 f837b42b43cd48252d09e40fc8e16134
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:     2316 5547ad1d6b21a1bdb0ed4d3aac3b2af0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    88704 9a2e14a40cd66737083328f7918242ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    35154 15296b4b2fc94bc78163557107a15007
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    42374 8ab6f22eb58486a008844aaf43758774
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    70524 e38ebaced4cb9d04cb08b8aa59520e6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:     5740 e393810e2d4d35396926bfa3dd918b40
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    34328 1c4c0869cd57b70d5e2c02fb7458aec0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    53478 de0d34b733b9b5d3cac824cc227d8153
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   129590 5c3e361a5d423751a72121e0f1f9e71a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    43836 026317b3cba49e6210fc76b933805598
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   115018 dcef6a660b7ea2b529a78caefb6e2df1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   253680 8ed58825527e1c854b64bc7bd2e39c00
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    83362 22fc827dfc60545a5448ba0d60dc879a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:  1498050 eb0eb7668446dc1ca5dd8a39f9586e5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-generic_2.6.12-10.35_amd64.deb
      Size/MD5:   804828 552a388973dc796ebf89913ba88c3b13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8-smp_2.6.12-10.35_amd64.deb
      Size/MD5:   802806 c488da56ef478fe0a853b41eb591a49e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8_2.6.12-10.35_amd64.deb
      Size/MD5:   803778 fb42ba9a39e7a0e073a2874473d11103
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-xeon_2.6.12-10.35_amd64.deb
      Size/MD5:   800098 9c3334627cb88e7244e0324776f5ae79
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.35_amd64.deb
      Size/MD5:  5919978 f72130d083616acb29fd187377af0acc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-generic_2.6.12-10.35_amd64.deb
      Size/MD5: 17088772 c5a2503a9bf056af210efeaa2d7fd312
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8-smp_2.6.12-10.35_amd64.deb
      Size/MD5: 18131078 2e102232ae0f917a5b7e5578b700b407
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8_2.6.12-10.35_amd64.deb
      Size/MD5: 17954512 449bf0e5402c5c90a71cd21cb149f294
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-xeon_2.6.12-10.35_amd64.deb
      Size/MD5: 17898726 704544617259411ec0165c5fb78c47e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.35_amd64.deb
      Size/MD5:  3512620 9f50cf888577ed93090f5fc08a5c5a0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    14292 51137778cc1eb8489c4296c1829c410a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   191792 33c4ceaa249ac3ba37230d6d414053e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   170364 107887c6d2c1622b9d34a0d4d1e3a86d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:  1048472 28ad88f97b9041c5f9931d84e16795aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:  1147282 b8c7bf51011a554b00c0b5ea4878984a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   122452 abeecea1b5c0c0c357c4bfc214ab0c5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:     8538 fe89094d300c743c38a272e9a1d6cc59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    99022 12106f07d3c30b6fc61f0bbf9036e16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    44948 b22b82126c80878ae6cf74f37dbf3de0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    31646 ce23cb9e063a4b0ac346d17a3df052c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    65706 60bf5a6d29ddb383c3e7483c8f83bd27
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:     4474 5db6920adcd5ad29bbebcb6c98c3abe7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:     7876 502b6d69e97be496977784edb0e6cf7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    53868 623d6d11ca8f57cc351d4a29f6609ce6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   107328 406135beec2c770e347e077ac4d96ec2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:     9882 0b16dc8769541c5db15b7f0bb72114b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    69762 6c38312067089e9526924c66930e60ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    73060 f021c45c6ae4cb767f69f80d2c659eb7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:  1271058 8f69f5a4be8a35fd8384fa5c395e1386
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    58384 601c02afc408155a7c673c884be3d250
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    22212 2781730bd06206f4f7374391714af43f
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    29358 96636a61df653031eb718e478f8e2e58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    62186 c2326431b182804583a897a7c896bca3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:    34964 bb68d6c85bf4452d3a68a544ef070dc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.35_amd64.udeb
      Size/MD5:   248888 43b1ce415d9468e1dbcb8555902a7f25

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    18672 54b7ca1526fbc547bb4db8d6a77af358
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    43956 62aa7050cba03fa92c4ecd9752ff1d1f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    96882 fa75e279228896baa3f6d6155eb4496c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:     2280 4f11d0d2386dc48f2d55abdc911c35d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    83576 9a26c6152cb52831700dcbc76e67566b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    33138 effe728fa516809994d13b2ad0a5a00d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    41918 966574a644431a68a2d5bad9c7148683
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    68234 ca0aaccbbac04145af62e595359e629e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:     5366 70de1e0907132d8051604c469f3e9163
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    31128 d4c8860008c2be4f5412648627868c3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    51410 403b629b3f1d705b45353e4a8d86e53b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   123394 9c9dab8f3450937b2246c3978750959b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    42478 ad85a1d07f29ff803f14112caddb7c84
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   110272 4edbe326748bb6542d44c540265ce7a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   239820 307770a7064513ba4640dc913da0fff7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    86176 ccffa0b35d5f35f6bba295afced5277a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:  1418056 dce6a7c14a01fdb7bc79311aef4f0722
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-386_2.6.12-10.35_i386.deb
      Size/MD5:   802952 dcf9ad799060e5e0986f1b6022f3e27f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686-smp_2.6.12-10.35_i386.deb
      Size/MD5:   798322 5da0f1b341dca36e241234fa8ec44ee9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686_2.6.12-10.35_i386.deb
      Size/MD5:   800214 fe5ddbdea62a327600cbf383885fba58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7-smp_2.6.12-10.35_i386.deb
      Size/MD5:   798444 3ad2f8d603c6afa321727ec002a3689c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7_2.6.12-10.35_i386.deb
      Size/MD5:   800318 94b7845233c10d27387162a2959ab241
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.35_i386.deb
      Size/MD5:  5929342 9f1988c75367d99d7e40a5af26d25692
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-386_2.6.12-10.35_i386.deb
      Size/MD5: 18026294 8faabe1f2d9c99690e4562b25f4cd371
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686-smp_2.6.12-10.35_i386.deb
      Size/MD5: 19368668 e4086602e72f6651cfaf69eb9244f57f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686_2.6.12-10.35_i386.deb
      Size/MD5: 19463944 4f34af8273c07b8b448cac9b78351552
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7-smp_2.6.12-10.35_i386.deb
      Size/MD5: 19500738 c10fd473d2a4d540568aebe32d4231f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7_2.6.12-10.35_i386.deb
      Size/MD5: 19545550 9c7e3e27e13ef16cc87726646e75a70b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.35_i386.deb
      Size/MD5:  3512168 436185f9253cf97e78b53fd128fdc74e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    14530 e0f7cd7ca32a9ad2ac2b40f887776dbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   194788 c3e05aba1fbbe1759deba82dcacfb2b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   166500 5a7a2c21b7e46889629c3c132e3afc93
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:  1048166 f0816adadeaa034f00c9c4c825f3fa6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:  1341428 03b96cf964561958fbae8815b87b54f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   123678 7f9e8b18c607b07aafd75f9cb0b92423
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:     8250 60a3756fabda0b6b5e743c33984c5618
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    93376 f88d3e03d49b2c704864c29e9a9326fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    46820 038294f096bd819fbf859cd577e000dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    29770 ab34253e9034b9ec15cb3d1c825e5b72
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    72282 7a70bad762ef0beb740fc4d06dc7bda4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:     4256 a1921bb705cf1a04b859bb2d47d6636b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:     7664 41a9e009db8d9d253f08732e965281cf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    50626 163a32250f3035811f7d3707baeb070a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   108632 a6ab2dc6df860b26b1429bbf587c95d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:     9806 22aa35b0c21d035f15f6d0a0f5cf8ec8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    67634 572cf432de0bcf503e88295ec5f817c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    70180 5f63b92f210d80fba415dab3f7025357
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:  1481142 77b8149f74f6a1c24d9c06c4897714f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    55208 736d67e3a8f7e009c0fe8686aa19585d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    20350 52822afdc2474a52a02f79e2bf9d8ac0
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    29916 c51029126da365ade0a9d8035d1050fb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   111228 3a6aed075d29c48eefd29e1130f2db1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:    34552 4259b94defc6684f4daf2a2463a99f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-386-di_2.6.12-10.35_i386.udeb
      Size/MD5:   263266 219fa39e3d34de0fa19da7d84631a99d

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    23362 b160430eb0fa52d4cc0489027fee0b46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    26350 833c78526b8b4de6605961249d639fdd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    55912 47733a354f48dcf6868acb19f61fcfc6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    58830 97bbb50dcc242c4f14c3121a99e31aff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     2314 9821ceb57ee08f11cc3cbd783dcccb9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     2502 a59dca3e6dae53573505fce31ea11e7b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    29756 b926eac465a3f820aae257539cabb2fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    34722 f2423c0d041ec11b036d6873fdeb22e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   104682 f201a7f87c546882d147797263106492
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   122188 7b9ec52276c60aeafd0e2002b4b0158d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    40506 4489c3b3298ed30994da9d2662e22469
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    45904 8369a9fd10bc4371fd6b47872484b4c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    29000 9c35cbd6a401015312011de66506fdca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    29928 af5f8c7c9b58718a10201d9700bfa0df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   210092 8fde976b1b7577a9d1b68b5ccdeba3e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   224760 5de33435437eb9f2f66499d9e5f3a01f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     6150 c930ca56bbaa102d331ae5e2f1c9d8c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     6962 209f70e67030aeaffd0b3f551435aca4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    45170 7b14568b5b7196be4307e9326f731367
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    40422 8cbc48c8d34894da632875edea0e564e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     9796 a31906fc860a9605bd7f5cab5fd22791
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    11780 02db3b60a11f98d54e9de0f749d0c24b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    76794 718760b3a428e0a872c19207b9c64f96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    85194 ac24d926a32b1fbbbed2afa9d69f69fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   112172 383ff79ace73f85c17cb80e2186c3ad8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   129202 e880a13c8c88a99ce5c43d811486305e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    76740 806b1825460f0f20d692809682a9e718
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    90410 744ead572106822772086eee83c84a02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   140762 c26890a593e3fb42c66c309f6e57fff1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   157288 7be08e3b9192cfd4314728cbb09fecde
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   306084 a8b52178dcb0a7ccfe22ec3d57a22c51
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   210692 8f129e6b8fb48674c70b96fadb50d7fb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   110784 a2487a9ae04cf1b5a366edc90971376a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   116648 2c7bd8eada94d2da9fdee69f2ba6ad9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1976400 c63c717129498f5ad9f747007beccdf4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  2350452 d06c02ebe77bfc8400ccba94fc0a4a1d
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-headers-2.6.12-10-iseries-smp_2.6.12-10.35_powerpc.deb
      Size/MD5:   774118 c63dbab09d248f6dd8c7aca4268b1b37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc-smp_2.6.12-10.35_powerpc.deb
      Size/MD5:   783128 769fbb20f77e90e4aa145653e1e7a24c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc64-smp_2.6.12-10.35_powerpc.deb
      Size/MD5:   800810 b36a3a5f2ebb0e314530c873938bc8dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc_2.6.12-10.35_powerpc.deb
      Size/MD5:   783382 15bb3fe11b91710a4917bc0db8f0113e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.35_powerpc.deb
      Size/MD5:  5937112 b5bcd89926b29344b8a21e49dc1f717c
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-image-2.6.12-10-iseries-smp_2.6.12-10.35_powerpc.deb
      Size/MD5: 19519826 6192cffdf6ffed1e2df2f732a46f388e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc-smp_2.6.12-10.35_powerpc.deb
      Size/MD5: 18358190 3aa49b753722db596796f9a609cc6e85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc64-smp_2.6.12-10.35_powerpc.deb
      Size/MD5: 21185506 552f83a32de46e4b3cad76c516a6b691
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc_2.6.12-10.35_powerpc.deb
      Size/MD5: 18005918 4d28906ce1f31f1797df12fbbd4b83a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.35_powerpc.deb
      Size/MD5:  3512802 cf7497f5aedeb27caefcd6d836baaf00
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    17624 69fcd4226424346ee3e41c83df0c143b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    17790 cb3e6e4b23a3a4503e73df50a1c84df5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   234106 ef327b35d7f4a53ba9597e5bef694f72
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   258836 6c97926f570ab2551e99c95ffd188ce8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   208848 649c2b27eb2d72c2415944ecf37bcdc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   235398 07981d8098224d6da7a5d8fa65cd8cfc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1048254 d6d91e8eb1ef8c322595c09f95c92161
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1048392 5fb1cdbba4d58b8a261f9efc356b1f13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1457974 8ef4254ae5211245047176ba5305a44b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1622888 8e0c956425de115ade8d3480080e83e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   212804 b1a65387cf590bdb8590a36a2f24aec9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   197940 3724393db485b99e9fcf14ce097d7fbf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     9462 90343241d4891f3b923931436f59eb11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     9058 714989f8a24588d9cef33bdea5aef2ce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   115336 7c27b8759aca80662de713b8043002d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   134434 f8666c83721c8646f7abcae6bd74687e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    77022 c35741cf92dea6c92322e9bbd93d74c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    87516 ed1b3a7aa7a9993b7243e215401b6327
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     4818 7fc50084a65c7384f588210777deb9b9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:     5276 6fb085e5485eed0fd02aff22e7c2d1a7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    63052 066466741d7352d5ce1cb8744767c198
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    75988 dcae851295819dbbe85f4cee1176e489
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   128624 c82a9553bd66d8d96056c41141fbc1c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   164352 01fa322bc1c86b653779395ec9c1140b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    77430 c2e714d47cb5173eeaad8ae2eb73f183
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    98150 12b0de9b2a2c0443e01891f80f7e18d9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    85242 06b6d3892c92bd61e06c37cb6d3a3a89
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    92316 4344c9af7af4b5c6898d2fe025b2177c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1537886 44a5642824ab3956971055f1685a0781
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:  1755598 73960264c1cf7653df86c0ea3cc0b705
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    65296 47b785abdba54b4b6b5180efb1e0632a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   100426 4a9f9ec5670c9a63fde1b4ec4434f07b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    22882 338b316eb4345f14a7d0c7a292207f90
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    28604 552e4d4a75a992735b33d4af779ca299
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    35504 fedf1ac97666dc6502bb287f58acbb75
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    39802 7c6c4668ea30f4553466093dbf2415d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   139886 2d4091dd55b5eb700f2927536133b0ed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   152628 eb9791dfda4a75cd830207df57efcdb8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    40966 e24d90c9793a7688a6f34ce0270c2935
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:    44422 9bfe9db9c8c3d88f6b82624a675974da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   296162 45d944953077b1ef62ae49ee84adcc9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.35_powerpc.udeb
      Size/MD5:   324186 048ba2bcee6ddc3a322bb89ef479d9d7

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.24.dsc
      Size/MD5:     2895 6febec3d5d2c0ead0143f49a28b10ebd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.24.tar.gz
      Size/MD5:    25232 39dae736678bb0223a61d1d4aa85c3a2
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-3.diff.gz
      Size/MD5:    87072 81dda57b302465bd20f9b95f7efe5ea8
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-3.dsc
      Size/MD5:     3187 6db92208bb0f02f130c95f6dcb23cd37
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11.orig.tar.gz
      Size/MD5: 97566445 8bb235f9119aed52797b057827756b8c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.44.diff.gz
      Size/MD5:  2119740 922db10dfdf5f4bdd87613ea770ecb9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.44.dsc
      Size/MD5:     2381 afa1d361be217b3d599893fd101e2a9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-doc_2.6.15.24_all.deb
      Size/MD5:    23332 b9fb1e42ec2537429dc6f75360452381
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.11-3_all.deb
      Size/MD5:    17764 5e21e5eb333dcf5ebd9e79c4b8846c5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-source_2.6.15.24_all.deb
      Size/MD5:    23368 f42277e3fa3961e4c37eaf67f2c515f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-26.44_all.deb
      Size/MD5:  5156912 be661603ec0b9533b35b0a298f6b4132
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-26.44_all.deb
      Size/MD5:    87010 1b11101ea3f70dab5b8a0ac117150ed4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.44_all.deb
      Size/MD5: 44452740 dd7101df4b708a5a06ce5fb4f59327db

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-26_3.11+2.6.15.11-3_amd64.deb
      Size/MD5:   474878 749dd2461bf7bcd48924689a31ca5ed7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.24_amd64.deb
      Size/MD5:    23394 af9f222adc4b943dd8e79d51adafbecc
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-3_amd64.deb
      Size/MD5:  2404850 c8eaedb7df79430f848f94d597dc6d0a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-3_amd64.deb
      Size/MD5:    76074 2d8c4411709eaeb3f1a6fea78d03c86b
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-3_amd64.deb
      Size/MD5:   510346 f92843ebf35574217e081a85bb476731
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-generic_2.6.15.24_amd64.deb
      Size/MD5:    23400 1b25b314e6493687b3aeff77932321f9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8-smp_2.6.15.24_amd64.deb
      Size/MD5:    23472 46a1eaaeec23ca1d5802aecd6b39d55c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8_2.6.15.24_amd64.deb
      Size/MD5:    23402 2ef69c61328fbf539899bfdce5611b3a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-server_2.6.15.24_amd64.deb
      Size/MD5:    23388 55ea49e527cc1e03ee408ab389d2cc0f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-xeon_2.6.15.24_amd64.deb
      Size/MD5:    23398 5f38ac7b35c35d53c02a3e627b85e361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-generic_2.6.15.24_amd64.deb
      Size/MD5:    23388 314885aea9c6c1889a7179c518faca0c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-k8_2.6.15.24_amd64.deb
      Size/MD5:    23392 eb81dd56de8bd1df4ac2c8c39b137771
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-server_2.6.15.24_amd64.deb
      Size/MD5:    23392 fcd6d1cf50762b9ee0ec89d95636940b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-xeon_2.6.15.24_amd64.deb
      Size/MD5:    23384 9709f8f92152a7aa7ff9135e72a36473
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-generic_2.6.15.24_amd64.deb
      Size/MD5:    23384 462dfe1190203652ac176fdd05dfbad3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-k8_2.6.15.24_amd64.deb
      Size/MD5:    23384 591cf994a8775da73942eb42de39e643
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-server_2.6.15.24_amd64.deb
      Size/MD5:    23384 669154f8def60b3ba9f5b24a5108f931
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-xeon_2.6.15.24_amd64.deb
      Size/MD5:    23384 bc2f4b5e22594625885b93631327d3ed
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-generic_2.6.15.11-3_amd64.deb
      Size/MD5:  6861090 7d497e616155cb8ea697d0d30874261a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-k8_2.6.15.11-3_amd64.deb
      Size/MD5:  6860580 ec9d9e746ceb8efac09ea5596fabe535
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-amd64-xeon_2.6.15.11-3_amd64.deb
      Size/MD5:  6837426 56742a587649b834862ccbece77c33f7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-generic_2.6.15.24_amd64.deb
      Size/MD5:    23412 5c866b5b5fbdd8877dba0d4335488790
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-k8_2.6.15.24_amd64.deb
      Size/MD5:    23418 70f37b78195f2dd8bc4057e451ed637a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-xeon_2.6.15.24_amd64.deb
      Size/MD5:    23408 35dc8e3af46e1da95e572c4f9a1607ed
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.24_amd64.deb
      Size/MD5:    23352 da7961ee7efe7b553fc1e7450a63bc15
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-26-amd64-generic-di_2.6.15.11-3_amd64.udeb
      Size/MD5:   799512 0544780dcd7b39f028ab9a2a1f809e7e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-26-amd64-generic-di_2.6.15.11-3_amd64.udeb
      Size/MD5:   497776 4695b26ee50131b32ab4db239c2ef622
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-3_amd64.deb
      Size/MD5:   166036 e187958b3209dda0ac68e4d002c87a0f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-3_amd64.deb
      Size/MD5:   161620 df76bf65d534379fbf3b073494bd1765
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-3_amd64.deb
      Size/MD5:  6070436 1a1e6482600de41e07835539cbaf6693
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-3_amd64.deb
      Size/MD5:  7320176 88a7e8240a31b1e99168432c5b472bdc
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-3_amd64.deb
      Size/MD5:  1758192 7841d0d61604ce92d4d5d5b49e8e9f61
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-3_amd64.deb
      Size/MD5:  1405000 d2fb655001ed2c4d2f572745d8d18a7e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-3_amd64.deb
      Size/MD5:   125170 325cf2e213ced26fdd784cc4b5cbb586
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-3_amd64.deb
      Size/MD5: 17296314 19141219655631fc2797d0d721ed3302
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    22134 f30a4cd98ed4b99485a7eeab6a672ca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    44778 70619a1e42abe238b097b1b71eb455d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:     2304 8629a64c32b9f5038ed4b45ab08b4370
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    36186 75476ced0dc3113dac2c9111a8ee96b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   102018 3bbffc1d3ad59547782f878379b1f395
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    38602 bfe9fa981ad4067ac89fa34a61bd9550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    49128 9790b59eb71bbd61d5e3aee8ea2cf91a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   176756 73a2de27da5de34bcf57d7d7d0911f6e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    36762 01bffc13300bab140a7a74c348da6866
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   142190 af394f59dbe56d5b74d5aa3590844003
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    51040 f423c9fed29deafa1ce46b276679a2a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   140414 c8e8d46f79d00cc68d77d3b9747cc334
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   286888 4a0fab5ced8a6ce7e3b8c58c9087df5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    97794 1de0e81cf44a2978fc37c4460161c2ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:  1650194 16712a33b563fdd64bd781ff1c5cd271
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-generic_2.6.15-26.44_amd64.deb
      Size/MD5:   859402 0b737bdb6cee0de97bbcee8c8289bbf4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-k8_2.6.15-26.44_amd64.deb
      Size/MD5:   861354 9593d236014f0443d792f7d2abea03b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-server_2.6.15-26.44_amd64.deb
      Size/MD5:   865462 5cb1904f17b4fd6c374a4c755aa2b2e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-xeon_2.6.15-26.44_amd64.deb
      Size/MD5:   862718 621f11f2eafeb658f30c9a5dadb54e60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.44_amd64.deb
      Size/MD5:  6907946 3f079a92f6ecb12f5787bff0652f5f12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-generic_2.6.15-26.44_amd64.deb
      Size/MD5: 20724522 ee3bceadeda8e8171252b68e01933de2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-k8_2.6.15-26.44_amd64.deb
      Size/MD5: 20690632 462928f8999edf70431b7ebe4e36c315
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-server_2.6.15-26.44_amd64.deb
      Size/MD5: 21533876 ec1852e0a37d3235b97119882129ff32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-xeon_2.6.15-26.44_amd64.deb
      Size/MD5: 19808024 a69a66f329b88f016aab61f566e37c1d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    15622 d0e152b1d89af3ed3b189c98838b12b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   240248 abf367222f83064766bbf52eba8b4e6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   202552 9e01c7205acfba22ebf778eadd3ef289
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:  1048602 f5266b372d87b28f5c01d72bb50ff0d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:  1468262 72aa3a8f245ac535d972a684ae343094
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   161634 a405e2af9b1632803b67d7ce64186f1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:     9826 a3175cfa426939c6c06622f6da8a5c78
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    80850 1f85def6d33d3efb6313b1d4f1d26636
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    49164 cde26ffd3934e7620a7db7717aa1daf3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    35150 ce01c869d7b10938e1fa00524c0126a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    70852 fe7eb5523cf5cc7bdd191991a960d734
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:     6214 9e90e91b96b6c436d68f78b22fca25b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:     9060 51db0271e86fe749bed2376efc940e3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    57870 b8ce9750aecf59cdc494c65de112c8bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   123328 83cb5ef4bbb5b047e6d4c8983088f4f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   100576 dcb134e10c44f4fd0bbb82d1fb2df443
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    79194 778ebe5485a19788dc4d4f88a523f44f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:  1594632 b2ff2e5b743e429b7d3f2abe532f8626
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    72276 4d089c7a2a4159d9b689a0abc9067e32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    12646 557e61ac1f446402cb311af8bc3fd8c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    33734 ad39dc1fc1e69675af71dec72c5be90f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   138196 7f2f6c590b543a4d7bdcdfc59fa16732
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:    38862 92da4b789c0b9a42351d1669af111e4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.44_amd64.udeb
      Size/MD5:   278738 52e9248522b69133378c908b7f2c32ba

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-26_3.11+2.6.15.11-3_i386.deb
      Size/MD5:  1204402 f874584e73b7f4feb27df781a8e78a62
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.24_i386.deb
      Size/MD5:    23400 7fef182abb0cbe2eda432111d700fde4
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-3_i386.deb
      Size/MD5:  3692164 5591f305ffcc6efeac5df585bd912fdb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-3_i386.deb
      Size/MD5:    72970 d2a4b3aa7a265d97af28e4b48619d045
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-3_i386.deb
      Size/MD5:   660314 e243cd03f489897361d8e47014552ea1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-386_2.6.15.24_i386.deb
      Size/MD5:    23374 0aa94e0935fc4dac2dc3175b1d9013d2
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686-smp_2.6.15.24_i386.deb
      Size/MD5:    23474 bb9bd1fae32533bf95be26241be5eff9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686_2.6.15.24_i386.deb
      Size/MD5:    23402 deabf914aae7efd166fa4c8090192b4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-386_2.6.15.24_i386.deb
      Size/MD5:    23360 69393ab0cbca5db79039ed7ef8fb5808
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-686_2.6.15.24_i386.deb
      Size/MD5:    23394 d2c4d920b4d570c9d83b5a052dddf15b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-k7_2.6.15.24_i386.deb
      Size/MD5:    23372 d80c68631ad9427ed74e985f131fcd1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server-bigiron_2.6.15.24_i386.deb
      Size/MD5:    23398 9f0b6e573044b7ea8f8a3ca5ddcae3c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server_2.6.15.24_i386.deb
      Size/MD5:    23382 d91ae94ddce5d2fcf711cb2249aab898
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-386_2.6.15.24_i386.deb
      Size/MD5:    23358 18ee3e6195ee22bc15bd811ba36432c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-686_2.6.15.24_i386.deb
      Size/MD5:    23390 37269b3d82eba1a48164797c6ca8bfdf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-k7_2.6.15.24_i386.deb
      Size/MD5:    23366 d7a2e6383129aee534c1d38ffb85528d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server-bigiron_2.6.15.24_i386.deb
      Size/MD5:    23400 3ae96207925678b1ab43fcd7fe31f8d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server_2.6.15.24_i386.deb
      Size/MD5:    23378 31af0e6e43953e96a7cc40c428868489
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7-smp_2.6.15.24_i386.deb
      Size/MD5:    23454 683d3d2292759d9b60103ee2074c1fc1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7_2.6.15.24_i386.deb
      Size/MD5:    23386 e076ec895665f7fdc63aad6a7b5ab04a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-386_2.6.15.11-3_i386.deb
      Size/MD5:  8137574 757ca1376770f6bf9f28f5dec4cfc651
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-686_2.6.15.11-3_i386.deb
      Size/MD5:  7939208 2d9106079052d9c8d9962c1c63a297d7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-k7_2.6.15.11-3_i386.deb
      Size/MD5:  7938034 81e28d4f436ad0bc0094819a6de16104
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-386_2.6.15.24_i386.deb
      Size/MD5:    23390 510502d3643a3ba0a58462fafaea4e29
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-686_2.6.15.24_i386.deb
      Size/MD5:    23422 b3663b8882a747891034da0b5ff996e7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-k7_2.6.15.24_i386.deb
      Size/MD5:    23404 bee544770a8155bbd71b702a246b4ac0
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server-bigiron_2.6.15.24_i386.deb
      Size/MD5:    23396 a3e4a2781fd52f0b402119f4adde0f92
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server_2.6.15.24_i386.deb
      Size/MD5:    23378 67e8662dd0a53395f1ae3524e450c08c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.24_i386.deb
      Size/MD5:    23344 78ea3a44fe843cdaa84184701db2abee
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-26-386-di_2.6.15.11-3_i386.udeb
      Size/MD5:   799338 1cdffd70ecbb5f3e1b4d0baece350048
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-26-386-di_2.6.15.11-3_i386.udeb
      Size/MD5:   475496 2f9307b200d2dcd3e608e91be51a90bb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-3_i386.deb
      Size/MD5:   146766 01493dc64d4d916bedfab7feb254339f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-3_i386.deb
      Size/MD5:   139732 7d62c4b2bf5345029946b17b76cee3b0
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-3_i386.deb
      Size/MD5:  3060020 c21a97395d76b0bb72a1f5ec914e6959
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-3_i386.deb
      Size/MD5:  4058970 70020733d87bcd79e1e41c9f3a59a5d5
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-3_i386.deb
      Size/MD5:  1693140 dffd4a4e006aa1a0ebbb969775b3caaf
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-3_i386.deb
      Size/MD5:  1401448 e18b2761cc34c4b8ac2fd2cb925e983a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-3_i386.deb
      Size/MD5:   110630 1fc71d94af31b3fc2eebfc6cc4bd5048
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-3_i386.deb
      Size/MD5: 10556830 b4eeffac9612904cd916a7feb7f70f42
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    18970 b91a626aa649ded642d331e898a318bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    43454 886a56d9a606090b80aa283748cbdd82
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   105196 b2d07dec96629303db5cb0144674c508
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:     2280 45e4060453be3c61afaf6536ed759c91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    34478 390abfaacac58536f1f0d6124432c582
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    96798 78ecfb6c0ed463afe0d5e24d0f8923bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    37064 0bf57f5c4004d85cc4d8fcadc15113d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    44068 eabe61619368a6e401f8a2a6bbddd39d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   167670 b89177595026e2b38cfc91b99f1d9fb8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    33926 dff0725a05c9180e56bf983087851556
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   137816 6746dc4d220fd47f11d11fb66f44d58c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    46872 4153f37224bc06b2fec15c351b1b9fbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   132756 a30dbe27bb0649ff17122a3f70c1c674
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   273442 3d86889cdde18ca9031995b933a24a6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   102250 f682585d272ce254042f4ab799628109
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:  1594618 d891728af447f737e3e492e9f24e5d5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-386_2.6.15-26.44_i386.deb
      Size/MD5:   848938 f7d8c71f562eeb3e4e04f48101422250
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-686_2.6.15-26.44_i386.deb
      Size/MD5:   855166 130fd9cf868d54bb20399ed07d705853
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-k7_2.6.15-26.44_i386.deb
      Size/MD5:   852550 7bf50acf09640c40dd7162d3e831cef6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server-bigiron_2.6.15-26.44_i386.deb
      Size/MD5:   853658 ae2b316bcd22ed48115c9f5cb4ba27ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server_2.6.15-26.44_i386.deb
      Size/MD5:   853984 b57e8aa9d2fa6223315f01e170127559
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.44_i386.deb
      Size/MD5:  6900560 e350969045f85882e10d033f553cc25a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-386_2.6.15-26.44_i386.deb
      Size/MD5: 21624484 66a3a23fceb2356a13eab5992c1dcce9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-686_2.6.15-26.44_i386.deb
      Size/MD5: 22411826 a622580ddfb89dda4295addcaacb39c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-k7_2.6.15-26.44_i386.deb
      Size/MD5: 22161596 54b036d78084351cf5664e80fd9af1ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server-bigiron_2.6.15-26.44_i386.deb
      Size/MD5: 23517152 b2e9bb30b3797d5fb429d635238d71dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server_2.6.15-26.44_i386.deb
      Size/MD5: 23070960 e14e12bb0da63e53827c512f9561f542
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    15502 0e3258806375f26211ab857f9099c667
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   238430 dcd949ac00bd3152169e030d5b49fe7f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   196954 bf56075d5bfe947d54541958075188a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:  1048374 ad9cbf061e57d1de39ca5d16d0622803
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:  1666402 98df57bbe2f118876f4571067805326f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   160802 721ff0c9fde3819a16034458846494d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:     9158 879e6968b19dceaab574bc809f785733
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    76478 5ebca509c85a97af8707cf1ad85f2417
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    53248 ac53fea6a59a61a397311bee74173228
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    33046 668b77836f285994d2f68e99cd206dd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    85616 12c6dbcae799653792b54055e8cf62ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:     6024 83668418728f735be4cf468045115d78
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:     8752 19c4c115392827ce7578de19cd8e893d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    53584 f75ad687a2a8cfc5a6b7de0abbbaa1f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   130770 0eb6a5d3ac869d4e118f695ed9aba791
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    98132 2c0ca09b4eadef7f00bf04b3654dbfa1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    77114 d3f887b52ebf0d2fcd2b05d9f0543f3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:  1768350 133d12da1c025d71eb2da8eb37cf3657
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    69556 2c7f8bc6794bd951ca0fb83ee70a82b9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    11758 7f08e4b455b0dd22426fd8a0121945f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    35998 fd12fddf51cd7c3858b0c92142161b9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   132284 58c8025264399f491f06376375d4f1e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:    38466 1abdb7ea04a03ae56524d6b4baac906b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-386-di_2.6.15-26.44_i386.udeb
      Size/MD5:   299114 a439a03f744ff4d2167b125797873e69

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23488 393dafb3ee58021baad9257bbdb43379
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3_2.6.15.24_powerpc.deb
      Size/MD5:    23420 fbb95bccf6b48ff75287cfcdc22404fd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23488 bb96484f1c8d1f84eb256cbe364d1266
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4_2.6.15.24_powerpc.deb
      Size/MD5:    23420 5001c1cbcfbb519b1f42f3b31143c97d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23444 c649be0c46ea2da45ec75c6069cd8ad1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc64-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23452 d879110cf7cf74a4d91a47b192d014cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc_2.6.15.24_powerpc.deb
      Size/MD5:    23376 431093c69cdef005c27154c0d53f6601
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23484 b267c04409d500376fe444be191e35cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3_2.6.15.24_powerpc.deb
      Size/MD5:    23418 9b200f40cc88f632ff896c38697ef16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23484 4593708e6d3580139995464c376627e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4_2.6.15.24_powerpc.deb
      Size/MD5:    23418 c47bcda3d757187530f689716a8276d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23438 07029079b7cf09dee3523970c67e5328
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc64-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23446 ada3c004fb7c6944a40a669cf61bff1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc_2.6.15.24_powerpc.deb
      Size/MD5:    23380 3993bea9143e6e6e02b67c05d8a553e7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23484 499a2f881b05fa69be998128833a31bc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3_2.6.15.24_powerpc.deb
      Size/MD5:    23416 46b6201ecb4193041e6fa4f363dcb3e6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23488 1d1cab7b89dfc92fd73d7e51adb0275b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4_2.6.15.24_powerpc.deb
      Size/MD5:    23418 a468e48f6ad958a93691bbec98c106d9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23454 12e57f41ebdfb81aa890db858f83924d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc64-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23452 e35034c72addb79d5fda8c666e857ca8
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc_2.6.15.24_powerpc.deb
      Size/MD5:    23388 42dbdc35517f0db4d4a0d1358f60c109
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-powerpc-smp_2.6.15.11-3_powerpc.deb
      Size/MD5:  1339366 2f3639cac08100cb4ed29a67b382ab6b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-powerpc_2.6.15.11-3_powerpc.deb
      Size/MD5:  1335394 c3dc6565b6ef114681d99a111d14a36b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc-smp_2.6.15.24_powerpc.deb
      Size/MD5:    23470 12ed180f28c3341420475279af7f72d2
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc_2.6.15.24_powerpc.deb
      Size/MD5:    23404 6299539cabc799058362c81f2dc5a347
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-26-powerpc-di_2.6.15.11-3_powerpc.udeb
      Size/MD5:   799412 20c7c92cd82ebff389735fea10cf8b03
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-26-powerpc-di_2.6.15.11-3_powerpc.udeb
      Size/MD5:   508176 10b3e88cdf0d1ea4dc66323a812dc87e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    23722 a108b9dbbe7f70c74767e54ac66f4333
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    25944 dbfdf7ae54a65bccf7a0c60240de80cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    49302 860039c43d85e6c312fe5f61dedfa9dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    51522 d9a8acc82714e47ff7865fb60f5aa927
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:     2302 d32d201f26cec658b97823ed3039e780
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:     2476 7fd4b9396af88ec2b90653e02cbb2b1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    40114 5ac5e5b1f921ef47c5e3276ef2cf58ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    43686 26c1443640df9b32793bee142471f594
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   112346 8b21eb20cc5b5983ee5e6be4d93c9507
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   120426 085f9c994647164ecb7fc6898a91d7aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    40848 cf478bafe385d788dea9feedbbb4cf24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    45342 d3e5b19e71d407a491de5a4572764550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    29026 a5a9c18bad81e11a9b7b5b61112dfde6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    29890 680e5599e9d133335ace7b113411ef52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   211382 1b3b155da7407ba7bdeb08faf6f033ed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   225188 cbd27acb5bb10061a4635e53405d974b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    45044 7076342c1f0174cccccd57db4fe43654
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    40206 8e06a7616c7b03455116fa95540051db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:     1926 1a1d79b7562faad8e2e5f713be746793
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:     2192 18082ebea676327ea1161f75e0ead6e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    80586 ff855c4b4c5e5af5c27f8bb00d835284
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    85944 4432bb025024ff8e96619d1892e66ef8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   111616 8852ace4e61727cadc5ddd6ab1e9c6f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   125758 4100790153e5a566574be1831965ff9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    53396 8490dbf1c156ebde10779c5fe1995271
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    58470 9e31ab9e9824c1e3ff14dbb5442c95d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   147640 e78c07ddf7f20db18de45047ed24e936
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   161428 b870a8b7aa23b399c3e424202f07115e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   317470 da7a3ac355d41ec7a79710402d0b3a5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   287578 cd2cc3f41e9bffb8e42aa23c9f149e33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   115852 1a9ea5c737372c28d88682c05c9483c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   116512 f08241feb41554bbeb6c48d17d00029b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  1922708 10d388ebfa188fc772b9457f988eefa5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  2434776 b70075a0153ed680670baa4723cfb15e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc-smp_2.6.15-26.44_powerpc.deb
      Size/MD5:   862592 e289281674dfeecff5deb8ad705e18d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc64-smp_2.6.15-26.44_powerpc.deb
      Size/MD5:   862794 c62aeefa13d57200d9666fe8993d9b68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc_2.6.15-26.44_powerpc.deb
      Size/MD5:   864242 184bd76ced9064f6926567dc8fe3fefb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.44_powerpc.deb
      Size/MD5:  6932318 028821973a73fc404fa79272821fb7c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc-smp_2.6.15-26.44_powerpc.deb
      Size/MD5: 22662546 9ff7eaef5ddc254bdf21c873f99c7e31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc64-smp_2.6.15-26.44_powerpc.deb
      Size/MD5: 23554050 2b9e9ae8b5971fb46045d7451151a69a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc_2.6.15-26.44_powerpc.deb
      Size/MD5: 22244560 d86cf94513a5508cc0a4f29e8200e2b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    17776 bee05c946208ae4c7f5c3da69460922c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    17376 1ae6a20760ea30f1e115b017351a372d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   261146 3ce8d9581fb9408743c3f98dabd60b8c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   282362 9753e7cf90085ad2cf8e0cf0a893db22
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   227456 aff994bd33228d351d1d2b9d13ce5488
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   248674 6de00e49ec0f5dca22bc168a4a1f7313
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  1048436 e9c62fe03d7d9a2b9b9d03818cc122ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  1048590 df15c592afe60afcfdde0458a6db6b44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  1652038 f284edc79ab94fc9c08a46e3b98c6118
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  1786816 3c996ab568023b02496884af4df57bf7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   250934 13dc27f23bf3e398c1c8e887ab77c64e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   233658 5a20680acfd4af3961b26fa7c7defafb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    13030 03d5cb4fbc20cf74e2bf7a83aebbb682
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    13516 978f835a28027062258810264f1bbf2a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    84832 d4d17bd4deaf9ab2462b2ba13d21e932
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    52190 03613761c93dbee57fc750481180a894
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    73926 d5e1e1f9b50fe294cf40bbc8de41ca88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    85842 a4a0a975c6bcd1a746b0321397b63276
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:     6616 cd7a16a55b9c3b5a6d8de36eb3e7060c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:     7060 49f861a2cd2d186c277852c41c7f37f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    60352 1d4fbfed9be287e81163eceb50a67629
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    70336 0c76cccac49b9ccfa96740d780e7612f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   128542 fdb60e7ab0a5773efc3c827f3470cc9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   157792 c764f135ea568cb6e0e537522afcf246
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   107708 952c5c86e933363693dcf52f941b8869
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   125538 124b4de5b60ba070cceb61aa522d83fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    87242 e2efc34a25a292c76683e3aa91118ca6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    93266 4a9026b8a746978457a5306dcddcd038
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  2013962 f6f40783ede2f93da0478ee92b35fa1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:  1987998 51caafa473a900a84911684843e80042
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   104112 4b0f2808d8fe0d5b43b22b9f80238625
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   115680 f25cc0df267dd813987a761a7666f69c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    12738 35ee00f548f6727df0964090d16484da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    14438 c7dae25e1a7cad1bac432d09d5c5432e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    39948 9aaa5cbc3d134979f2f7ccbc46317ed7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    41462 6180f14e8c1d596d6784fee2968b6396
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   148956 3fa27fd51b50622b909eaf8e2ff2ccc4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   167596 9d7c5f72677a0f384971ebd85a670b06
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    42178 c459f03cc71ddcc18c3fdcbf852ff2da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:    44776 64a9966d501a90b1eba80932286e2aa5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   320286 29984bafec28b1fa664e08e99e4a5158
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.44_powerpc.udeb
      Size/MD5:   324708 479a505bda7c37e351ba44fa12def3f1

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-sparc64-smp_2.6.15.24_sparc.deb
      Size/MD5:    23386 2ccc98babd719f4efbfef21dd98023db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-sparc64_2.6.15.24_sparc.deb
      Size/MD5:    23372 2315ea2c69a6c794037d718c5bc240de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-sparc64-smp_2.6.15.24_sparc.deb
      Size/MD5:    23380 357f8024a668c50cb23f73a57586337e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-sparc64_2.6.15.24_sparc.deb
      Size/MD5:    23368 1c12395b2ffbaedfd59e0055b4f80f69
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-sparc64-smp_2.6.15.11-3_sparc.deb
      Size/MD5:   828032 efcb89c5934ecb5ea4a77ac4d5557b28
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-26-sparc64_2.6.15.11-3_sparc.deb
      Size/MD5:   827966 55ff85bd5eff85365ee53698a9f80681
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-sparc64-smp_2.6.15.24_sparc.deb
      Size/MD5:    23406 5f65ffab8ede441deb8ca16cf35ece0d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-sparc64_2.6.15.24_sparc.deb
      Size/MD5:    23394 bae007d3a27d0c4894205c67e01c11c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-sparc64-smp_2.6.15.24_sparc.deb
      Size/MD5:    23398 35ec84fb42414aed201a4b98667f8f7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-sparc64_2.6.15.24_sparc.deb
      Size/MD5:    23384 891b632ad63a0648f9730df1c8e23cad
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.24_sparc.deb
      Size/MD5:    23344 0be75e4984ca260c26b09b16d654e002
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    50472 6da9e359452a72c90d7661727f642efa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:     2354 73b62b0b337a07e51b278b47aa449551
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    40240 215c03ba177864bbbd11b231c3beed2f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   110302 00bc24cbfb1e52b7d25d748996ec89d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    40720 4b2dbc2ed25a48cf4a5bae75cd8d0666
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   104220 fb1de3057006821b710778d140b488c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:     7434 4a65225e1c98092b2ac24415f49d3aa5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   148794 240dbb231d32fc7a25f3e6b5d65bf702
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:  1707356 805f1c6fbf4cfb3f26460c59d9ac90fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64-smp_2.6.15-26.44_sparc.deb
      Size/MD5:   762364 c60645a816c352fbfbce4d368aa56eda
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64_2.6.15-26.44_sparc.deb
      Size/MD5:   761928 55d7458497d9c434f6ad3e898206dde8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.44_sparc.deb
      Size/MD5:  6946194 cb7720de66eb8a4b330e7c6841e2623b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64-smp_2.6.15-26.44_sparc.deb
      Size/MD5: 14892174 f153dd40e76d82bc3ff096eff4d24aec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64_2.6.15-26.44_sparc.deb
      Size/MD5: 14715696 01853353e72d1fb5464a4950a6560ce9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:     7416 24d55a00954915845ae2bd9de39c4448
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   248514 cfb0537cbd895c6796898f9e5d6a1075
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   212260 3a90edc64638142730c3de0df10f559d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:  1048458 15dff63e1c6808c03d6e0b365a78e534
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:  1398926 8c77f1f71fd1fae50c51ff985e0c101e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    10116 80911b02587a41fe036bffcacf4c6574
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    40178 40480c092474c980bccd3b3eaed2bc3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:     9362 37a4c84bb49a4d562f2d29e37e698c0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    61436 8eec3c4aa323752fd8356379d29fa000
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   163010 020d35c849ec5eb557a868d686ad2a4d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    63930 8943cf57a42af0466d38de863b806a48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:  1235020 cb157a0a8871e004561b69291a478469
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    59314 da900fd4bb8d3206113df028b8f4fdae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:    37346 349b1205f654c417cf0bee65258003ce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-sparc64-di_2.6.15-26.44_sparc.udeb
      Size/MD5:   280064 1c3162a57f328202e8e1bc0f974fab6e

    

- 漏洞信息 (F47794)

Debian Linux Security Advisory 1103-1 (PacketStormID:F47794)
2006-06-27 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2005-3359,CVE-2006-0038,CVE-2006-0039,CVE-2006-0456,CVE-2006-0554,CVE-2006-0555,CVE-2006-0557,CVE-2006-0558,CVE-2006-0741,CVE-2006-0742,CVE-2006-0744,CVE-2006-1056,CVE-2006-1242,CVE-2006-1368,CVE-2006-1523,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857
[点击下载]

Debian Security Advisory 1103-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1103-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 27th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.6.8
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2005-3359 CVE-2006-0038 CVE-2006-0039 CVE-2006-0456
                 CVE-2006-0554 CVE-2006-0555 CVE-2006-0557 CVE-2006-0558
                 CVE-2006-0741 CVE-2006-0742 CVE-2006-0744 CVE-2006-1056
                 CVE-2006-1242 CVE-2006-1368 CVE-2006-1523 CVE-2006-1524
                 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 CVE-2006-1863
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2005-3359

    Franz Filz discovered that some socket calls permit causing inconsistent
    reference counts on loadable modules, which allows local users to cause
    a denial of service.
    
CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of kernel
    memory by exploiting a race condition. Likewise, it requires CAP_NET_ADMIN
    privileges. 

CVE-2006-0456

    David Howells discovered that the s390 assembly version of the
    strnlen_user() function incorrectly returns some string size values.

CVE-2006-0554

    It was discovered that the ftruncate() function of XFS can expose
    unallocated, which allows information disclosure of previously deleted
    files.

CVE-2006-0555

    It was discovered that some NFS file operations on handles mounted with
    O_DIRECT can force the kernel into a crash.

CVE-2006-0557

    It was discovered that the code to configure memory policies allows
    tricking the kernel into a crash, thus allowing denial of service.

CVE-2006-0558

    It was discovered by Cliff Wickman that perfmon for the IA64
    architecture allows users to trigger a BUG() assert, which allows
    denial of service.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad elf entry
    address.

CVE-2006-0742

    Alan and Gareth discovered that the ia64 platform had an
    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-0744

    The Linux kernel did not properly handle uncanonical return
    addresses on Intel EM64T CPUs, reporting exceptions in the SYSRET
    instead of the next instruction, causing the kernel exception
    handler to run on the user stack with the wrong GS. This may result
    in a DoS due to a local user changing the frames.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1523

    Oleg Nesterov reported an unsafe BUG_ON call in signal.c which was
    introduced by RCU signal handling. The BUG_ON code is protected by
    siglock while the code in switch_exit_pids() uses tasklist_lock. It
    may be possible for local users to exploit this to initiate a denial
    of service attack (DoS).

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1863

    Mark Mosely discovered that chroots residing on an CIFS share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.


The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.6.8-16sarge3
     Alpha architecture          2.6.8-16sarge3
     HP Precision architecture   2.6.8-6sarge3
     Intel IA-32 architecture    2.6.8-16sarge3
     Intel IA-64 architecture    2.6.8-14sarge3
     Motorola 680x0 architecture 2.6.8-4sarge3
     PowerPC architecture        2.6.8-12sarge3
     IBM S/390 architecture      2.6.8-5sarge3
     Sun Sparc architecture      2.6.8-15sarge3

Due to technical problems the built amd64 packages couldn't be processed
by the archive script. Once this problem is resolved, an updated DSA 1103-2
will be sent out with the checksums for amd64.

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3.dsc
      Size/MD5 checksum:     1002 c13d8ebcabab9477e9dbf7a5d66fa4d4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3.diff.gz
      Size/MD5 checksum:  1043822 9dc3ae088c90a7be470b9436ca317fcc
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
      Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge3.dsc
      Size/MD5 checksum:      812 822e18074a76927a0a91c83916c991bb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge3.tar.gz
      Size/MD5 checksum:    39108 45f3b6b40470a81768f113160754fdbd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge3.dsc
      Size/MD5 checksum:     1008 6fa522a94872155497a0e057a05f8b61
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge3.tar.gz
      Size/MD5 checksum:    67361 863b56c6386182f58fda2054099e9e52
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge3.dsc
      Size/MD5 checksum:     1047 294c981159570b5253bc877ce0543b12
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge3.tar.gz
      Size/MD5 checksum:    90731 3215b0f2a0dc926db6e05b04ff5760ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge3.dsc
      Size/MD5 checksum:     1191 e26e2149236092d9227773a904eaed04
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge3.tar.gz
      Size/MD5 checksum:    64130 03de4cad1ccfa5ce38f5b4b97b71f5ad
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge3.dsc
      Size/MD5 checksum:      874 2e925606f9143b774ab2e86a12d62c44
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge3.tar.gz
      Size/MD5 checksum:    15464 7dfeb923284a92f3bca5e8ef62a52498
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge3.dsc
      Size/MD5 checksum:     1071 9e2657e0a79bd6b3cde0df2e5c9aa77e
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge3.tar.gz
      Size/MD5 checksum:    26926 5f6c84921c0f6041fdd269a6c66a0568
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge3.dsc
      Size/MD5 checksum:      846 89d3a1f59fb514c8c5a195e91eaa1997
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge3.tar.gz
      Size/MD5 checksum:    12972 e3c65e0b2998dad3c440a0c1af5cd99f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge3.dsc
      Size/MD5 checksum:     1036 31e7168c06b98e03789c100b6a6fcf67
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge3.tar.gz
      Size/MD5 checksum:    24369 6c9e2b0e3a3f625cc4103b385f0c093c


  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:  6184022 54432fcfa3a56c502b0feabe6723c467
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:  1079878 a2ca885ba3b9b30d211c26647524cbc9
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum: 34941458 74c1b17e994280ac14d7116a52b771bf
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:    35082 7b08d82ec9046359cd85ea87aad96995
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge3_all.deb
      Size/MD5 checksum:    10934 0d1c81689deeaa145be9e4d3ae140a81


  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:  2757876 e94cdb8d12552d293018c7ca24199f47
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   230608 fdf2cc6f010f2b618672422c3293f3b9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   225502 2a21bf8197792a789420b1838526186f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:  2759828 544e1f44b4cebfaf97f4ae1870b56ab1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:   232152 9ba670970518572ad7db755e7888ee8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:   227100 a836d721852b11fa6422f33dc81a5415
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum: 20220874 d9c1642300f72cc5f3fc3b04865b3b3d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum: 20073352 1faa9472c15dd6142221fec2261b5628


  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:  2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   209500 8b284495343adf74bca8219421f4b48d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208722 941a680674931ec594e3512c5736c9bf
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208356 7ab2df2b04391d75500083585a96701b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   207502 0a840281a00f4762978af411d7a3e7fb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:  2802244 f82eaa9411813bbdee2e0c268a067c81
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   211350 c221830c715cfebb1acb383d8f7c6a8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   210570 96c096a16a6291f4b40716ac939bd063
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   210220 fc6c20856e898e4bd881711e6392d4e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   209468 6a00248dcf25809f02f7ab585429f27b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 16029232 665d462c1fae45714ff948289c8a3457
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 16927312 a69c9e976ab6810bf7043a15daa1dd29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 17480298 66e35e40e7e2d82370f7ccba7544a59a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 18306822 88ade3c07fc414c82bf589def0bda600


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:  2777236 af649947c652a9486461b92bbc33be8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   256920 88db1b684f215fdd35de0989f148b57f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254646 553205bb17cfc57f4c4a7aadff46650a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251590 51ebd6202b7f347f66df0e189b2a3946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254818 746967059979238eb49cfdcba572c07b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251708 33a61355c7a48d87b7570b772e454760
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:  2779348 210a335431d029842eb82036d5326edf
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   258446 1d48b727a22487e4b34f4894b2a9a7f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   256322 8f73439c2a920c66ae05d3ceba45229a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   253564 4ce8f253c15562e9d11a985e135d94b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   256504 5a5c2acd3ef2fb3764489ed77865739e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   253486 48f046411662bdde50195f8bdb421efa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 14063774 13d8810b179bb8408645e7fab57d114a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15536484 0a47b2f9fc33d4b7a52eb68b54419c82
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15346402 fffd9fb96343167ccc32356fa307152a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15261026 cbdee84292a612fddca022377e38eebb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15124168 248b85e7c59930aeb63fda6a0366b9a2


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6606 27049d0c329dc1cad092b2d53c3322ec
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6678 f3967dddbec5691733d49246d09f8cb3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6638 acc1b57c5a246304f9cee279574811e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6706 5c28f912ecc42291a9ec3ef0f13c6041
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:  3097054 691f7cd4d1b2f184e50ab566f20a13e4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198662 72e0e4b4331b8a600de3a98d6ac59a82
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197920 6e19efeac81a2a9416328af58316c4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198394 6d946fcc7b1fcf88c9ee9a47f7015384
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197828 8be7e8290bd8e7cf1b9c162c9e369b36
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:  3098862 aee4e1b99a34047fbf47941e2dced300
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199934 484af4636ad4d64ecbf89dd7b47cda03
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199302 8b6e3253f9c04054e1e9d2066e4323c0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199582 8b97de7837305ad8728bc0ab4bfeccb1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199190 508601b56facbca5211e2e3f1a819d4e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6602 dea61776e4279d8906f3d552af3ed55c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6670 d8ab34493a8cfc857dccd8a84743017a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6630 04e4d5b971ec3523b80a3f2373afbf73
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6700 f5cc48a00ca305eaea622738ce0d6570
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 21476428 ec3548487a558e67913419b84c84999c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 22133136 0d6292568fadcc40f65e87314315165c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 21408908 539197e6af86ff9583cf43d12ad109b1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 22154322 a4ae9740b9459b0a43c47b5b6e546515


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3305628 8029426256d755ea724ed7b46243c1ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3101728 677b103a57ce6de26b072245dfd585f7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3014324 f7a8e8b9c7d4eacecd1f1d69f1ee2c34
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2986734 fd1f14cc2856a55bb6948bdf956ea0d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3173334 e32fa0fd9460b9e19bd24c8cc413684f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2978518 6e682497437fa9d1912ea5fd3374c82f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3047534 f9daecf9203da30c95cd9ab9647d8c54
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3108200 9a81b37d60bdcf95d6cbc3ca5eb83d1a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2992046 cfae06d516a2695eb961e574570661a4


  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   407330 3025ba5c61db0cd42b9d0ab1a3e01b1c
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406624 21742d40c3c0bac0d64e970c0944c59f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406548 b9ce59161b3faf818f77239a468828e4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406518 e40256427db90a027ed2be8a7b50997c
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406882 c899bf1d81895ee43306a8b19e3c8ee8
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   407320 45108a12629a9eddd40b071db4b92e4e
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405670 bd347754ea8c4cee14686b207e6cf46d
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405666 1dec752373178a4aef51f74c6d917073
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405598 c39f371744ca92eec853ad8746f0f009
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405568 b346b94897fca3c678daadc99b515428
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405912 14475ec4cdc9b337ad2dc0ab3a772bdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405698 4c3c94aa9afb4e6d73986bbfa26484bb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:  5143830 3a6cd285eba77baae74a2a16f8029be2
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:  5147620 32c5daf3656ab15416c3a42a5be21afc
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13577038 981f85ad155781610e2069f28b1eb4e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13929444 b11a91f117e0d25b6df7a56cd2c0f0d6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13560822 44f1276a6cd811646ebf3ccb2da06067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13920572 fd32c8d3f0dbb55430075b57546f9390
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13594454 93d70ceed88a16e7af0fe3db1a2c5baa
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13847204 5f22d24e351ce6040f9fa995e5a7906a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  5083010 42c4dd8c6c67ce7940f0d24bb745385c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  5087230 aa48eb8b2a3a5f215bba97329947a2eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  2973758 c8d12dd2fbddca3ab1b7bd905de4a90c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  1140118 328edfc2944127e2f1d6dca1842ce51d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  3179326 487c36323990a6ae1119f4c30f16cdd9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  2977844 c491248ed7d4c71415be782f7fbe77e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  1142366 fddcd4821b89cbf30f47d5df380f2961
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  3186726 3eaf46617bf0ee1de50cad55f351aa54


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:     3462 c68f0624f124db25f3a41f78432ca11c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:     5194 b90da0337cb607278aa01d4ec0c19a3a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  2888690 29723527245a48a00e724c7366868ec9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   107974 788d40ca3a1a3f53b8b2cf4c1fc4badc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   142726 8719b1bf0d3aff36f7711d8979f87a7d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   143332 87bc055c575e3ec3ea44136ed44dff6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  2890616 a3717a911c04df4af4917c5a0366a8de
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   109996 d42960c6242e6a62d5a2cb9809645bea
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   144710 f1c0a8b3bf641019d7831cc1277ba524
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   145366 505e40a256abd9fa04a49321fba69115
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  4545570 00d7c7e1caef41efcbc198a282f2b9f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7428184 1f146c58f98331bf5826520379bacd33
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7622116 4de4c114879d82d79fc34cb93c070d43
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  4550972 ea3ec35673aed896ec9416a8f470bf77
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  7431000 fab9d693f9c9642b67e0d386f3df01ee
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  7628010 8c922a4190017515210c6738213b0782


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEoLqvXm3vHE4uyloRAmpRAKCEL2aSzNg4NCC7a4MgkE3gUS3dkQCfc3Dy
h9XpOeylbvWZtXWsn03PS0o=
=twOb
-----END PGP SIGNATURE-----






_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F47549)

Debian Linux Security Advisory 1097-1 (PacketStormID:F47549)
2006-06-21 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2006-0038,CVE-2006-0039,CVE-2006-0741,CVE-2006-0742,CVE-2006-1056,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857,CVE-2006-1858,CVE-2006-1864,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Debian Security Advisory 1097-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1097-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 14th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.4.27
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742
                 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368
                 CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274
Debian Bug     : 

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of
    kernel memory by exploiting a race condition. Like CVE-2006-0038,
    it requires CAP_NET_ADMIN privileges.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad ELF entry
    address.

CVE-2006-0742

    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1343

    Pavel Kankovsky reported the existance of a potential information leak
    resulting from the failure to initialize sin.sin_zero in the IPv4 socket
    code.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove() function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.



The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.4.27-10sarge3
     Alpha architecture          2.4.27-10sarge3
     ARM architecture            2.4.27-2sarge3
     Intel IA-32 architecture    2.4.27-10sarge3
     Intel IA-64 architecture    2.4.27-10sarge3
     Motorola 680x0 architecture 2.4.27-3sarge3
     Big endian MIPS             2.4.27-10.sarge3.040815-1
     Little endian MIPS          2.4.27-10.sarge3.040815-1
     PowerPC architecture        2.4.27-10sarge3
     IBM S/390 architecture      2.4.27-2sarge3
     Sun Sparc architecture      2.4.27-9sarge3

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2
     kernel-image-2.4.27-speakup 2.4.27-1.1sarge2
     mindi-kernel                2.4.27-2sarge2
     systemimager                3.2.3-6sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      831 fac953b669c78c37ea181597402b1c1b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    98672 717a42fcf8a6b67690a756b9f3f00aa1
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.diff.gz
      Size/MD5 checksum:     3962 fc1912f815afb314558fbadae87e43fc
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.tar.gz
      Size/MD5 checksum:    26319 368860bca1219d5777ab12dbc0713985
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1139 47ebcb365d37d7321eeee65b23920a29
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.dsc
      Size/MD5 checksum:      621 096115eaec61120211e0ba317b92def9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:    31646 1673537490a1af1a72ff1d65cd73139d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc
      Size/MD5 checksum:      876 2340c14db87e56a98e01dd17b095b7d4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
      Size/MD5 checksum:    21264 932ad64503240eedef626a0856fe5665
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1143 60abbaf01fa8d0f6ac0992eb08cb965e
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.dsc
      Size/MD5 checksum:      732 738178383acc2853cf8bd8b15861dc52
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.tar.gz
      Size/MD5 checksum: 15975839 9d7e6b12846c71e4d530375aacd1390b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:     9362 52942076ea9989d63ec619d0be8f324c
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      900 6a5fd70b803f4a0996b994d72d30c65e
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
      Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
      Size/MD5 checksum:     1051 e28f324bd15f8825721c36d2ad685f8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz
      Size/MD5 checksum:    11080 2813b0290efcd984fef6a69d9ca3c8e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:  1463783 1df6018893f9772d156ccf8e3080fb2b
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.+gz
      Size/MD5 checksum:   309066 ccf2db5585e30dd27b9eaf8d74285e70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      839 2f9746e3d73001a774607a2e8460dec8
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.dsc
      Size/MD5 checksum:      750 621fb9f1f76dc3fae5ed69f393ded2cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    54501 650afb6ddf33bd3c55d036c6e163f8d1
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
      Size/MD5 checksum:   741011 dc1085a42970fbb6f5174f8dae7f5bb2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1581 a0f54f9d6f61b4a31bdf49b2efa6a2ca
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.tar.gz
      Size/MD5 checksum:    17809 946929349518ac3d91c42825bfb6cabc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    31177 2d05a7a176dba04f37719199efa494b7
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
      Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      831 4aa4330d08a7829fbe9a548d1d8bab2f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
      Size/MD5 checksum:     1074 ef1ed7e19152004e160a48d320fed490
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.dsc
      Size/MD5 checksum:     1012 271d488ce319e95d567143228330e9a1


  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30482 64658643dc4a9554a722ff1b724c916f
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  4759092 15c5bd7f61d7291f1267c12733ffcb5b
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum: 31033502 47eb2bd29ad34555156eac2ec8160cd4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:    26664 88c43bac04065e47b6486bed94692e9e
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:  3580108 9542a6368e1668c0b3dd5529ba9c80f0
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   116802 a73dc8e6bb5119c7679d97d13b94cbc8
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30730 7cafd2b593e33cd0cb1ed5577a63142a
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge2_all.deb
      Size/MD5 checksum:  2419762 5e9e5072a78be7f12f2a499ee1116268
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    15944 00be5d0f60f2e89dec74ec2a76310638
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:   689772 9054c12e58f6b8c6d7f6055e94e3e2b3
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   631336 01476ba30e300b6b91a9a1a5d5c7f16b
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  9545000 c225981a19829b44b8b2e61beea177c2

 
  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge3_alpha.+deb
      Size/MD5 checksum:   272284 56ec516e9425c915a04a2a7184d15192
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge3_alpha.de+b
      Size/MD5 checksum: 16521602 4975ec76eb158179d36de7746cab88ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb      Size/MD5 checksum: 16966302 9bb2d088907ead2c2e689c139e945ef9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:  4573588 ad755c6e0a640be87f44d0eeb3cb0b9d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:     6930 5af591a1a57ca5b7b5ce7af39d0c30f8
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:   274064 b675644b9520620077d740f5033e311c


  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3145470 0e5c53017bbb7a84d554c1b6e60a0f6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3668438 2c00f060b5f4a599b1509e5625d766c1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  7331276 8ded6d50afd88d04fd9b601586509d32
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:   465160 61a35d05b6e9617ea9cec7ecc3ada43c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1692044 73cb9319b752cc5eaca4849e20edf6ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  4658994 b790e6512cd56ac98a1d9b5539c9d5b6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1056874 a03e9282e21db6a8094c8f2432a88e09


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12087676 c53fd67452bade39a41a4d07b1ddbd26
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   268890 b867a4d295e544fff9f5f0aa2a660762
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11713818 a039669989458b154e77063b9f2cd05e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_+i386.deb
      Size/MD5 checksum:   305120 bcbd70a2fc6c58ecf1ff373e398069bd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   300776 cba2acbaa7a11221bf20476dec02cc2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12340196 bb4547bd7a55cf5a863faf0eb787af72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:     9460 a52b72284e9b2ac4ea7249b9889dae97
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   293320 0cfddb9db531337f9220c787e2916002
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   299132 cf2755d7c9628bf753d4f9fc59df37f6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12682330 64e091ae35b42450a3f0af1af1b1cc17
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298354 03343347f66f3ebae64348769a8e7085
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298796 d5474dcad0aa041fa1bebffa5531a4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   298168 29f6f0af6edcc6fdc7b34fd33b4b45a6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   298236 251b20906cabdabc2689f8fad6238485
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11049672 7c1d176724d5af7ef5d92cf91a4b3a24
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.de+b
      Size/MD5 checksum:   300914 012fa2195bea70f63022c38ee8ece1b8
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2_i386.deb
      Size/MD5 checksum: 11992030 37b9f69b34c25ffd7f79c3dccb1c2b86
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:  1824238 b412dad8e3fa8ffbb88f9e24b720682c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   293678 293d14c82e8f2dc12d75d9ffbf07a497
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge2_i386.de+b
      Size/MD5 checksum:  4771964 810af192d449f6437de9c7b92bfc8f70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12420578 5699a644c8305231c6ff00ca615bc79a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   299016 8269e91daebb2aca7b360c15a41fa060
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12024800 595b16fd83e6ca0ca9b3b4df82934f72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   287484 80953396a754c47e76dc9c034fb2caab
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2_i386.deb
      Size/MD5 checksum:  7766984 0f4f4f9d1a0bc59ae4a2bf51734cfdfa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   299566 6165de4b3a2f79b3983d826f490f6c58
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb
      Size/MD5 checksum: 11303960 3519c2d9f88bcbbe6cd1a793bc21a092


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia+64.deb
      Size/MD5 checksum:   241990 1de0bc8938c45fdc763edc8b5be16dbb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.d+eb
      Size/MD5 checksum:   240416 d711a15e48958eaf0b0cffdb9afbe33b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb      Size/MD5 checksum: 16623356 6f87ed371e352b5ef736eeb9aea9b1e3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.+deb
      Size/MD5 checksum: 17020414 9748928c4403f7d1f708e4f1659ee56b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia6+4.deb
      Size/MD5 checksum:   241792 3f041268f31bbc7c13bb41f4b9b254d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64+.deb
      Size/MD5 checksum: 16980154 c21794a39eae3611d166574bc4d6c946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6188 510517c085a54b7f62b21fa549a28254
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6154 0ffa2668983b76eb117180f4127f443f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum: 16670542 5a5fc027a7ed1ea22de65134816ac27e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6372 9091687f1ccdd0a95238d4d8bf7a36b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6150 6862682a204020d9be7c3c7a24b58022
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:  4688294 fec3cf9e850845e1339b39eaadbfe411
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge3_ia64.de+b
      Size/MD5 checksum:   240852 525e38de6f834e7112097c26da92b929
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6178 c756f53c98ab21e53f097b2859433591


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2395830 74f11a8ca02e8a1cc776bf950e1d346b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2476584 4baad67d5c9bac3ee608a1f5b1d4dce0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2638370 76fcbcdc52016ae4feeafa765a3fc761
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2261274 baacace88b258a02d89ee5158269dc90
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2324432 202215777ec6ddca992a02551578bd20
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2543516 00b54f06d0e048692fec00cc8f888cf3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb      Size/MD5 checksum:  2395344 9326ce159e507c20e26fc4aa4ec9fa61


  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3852294 0b6ccfb76fed8400f453953d7421c2a6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3849540 57d70bee7ad3a52c2e41296a4b660748
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.de+b
      Size/MD5 checksum:  4681678 76bfca90e34781e213f64d92e412f7d2
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mips.deb
      Size/MD5 checksum:  7177648 16b29faa543ea16b0f0b1e4b79bcca92
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
      Size/MD5 checksum:    19330 f81dbe5f0089f55ccffdb5160fc14529


  Little endian MIPS architecture:
 

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mipsel.deb
      Size/MD5 checksum:  7040154 219d79c89034cc245aaedcc09c077253
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
      Size/MD5 checksum:    19372 f882ee84e76926b99370922778731da6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  3031408 2e21dc55f4e6c7d8e31485cab88b52a9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  2991822 83720b4706c20d32513fdc764e19a3db
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.+deb
      Size/MD5 checksum:  4686362 1e70d957d920f262ad64af693ead756d
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-+1_mipsel.deb
      Size/MD5 checksum:  4102944 4dcc900ca58f7d7e69f0020bb3237dda
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1+_mipsel.deb
      Size/MD5 checksum:  2137112 45fe0699fea23090cc4bc9368c6060e9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_m+ipsel.deb
      Size/MD5 checksum:  4670600 64746373b5c99a31c486fb360ec9048c
 

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:   155366 c357bb9b9fe6ce282b9bba63a0bdaec4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum: 13478728 3e7a96afb9b6bb0618a69d490d3df3e6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge3_powerp+c.deb
      Size/MD5 checksum:  4800960 668fb5a82d4ac36e66da1abff65e531f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum: 12750476 7f6aa3d1cc7c8990cf5ca2d8f5d5c128
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:     9868 61edb2922c82b932b5a51aabd4e3e962
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:    66712 0f1a666913413ccac067b519949b64be
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge3_powerpc.d+eb
      Size/MD5 checksum:  4683234 1dc1ed36b3052d676aece64519c79067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:   141276 627427945710a84e25f9a6e81cf52871
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:  1817290 168aae93e0888603a192acfb55c17ea4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:  2499398 6c3464992e5fd4f0c76bd6e456603b69
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum:   155380 29ef8c314e3ff4ad80a159e336f30cdd
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:   141508 23beb8633e1bc6c71cd7c85549ddc547
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:  4693350 489de2e942db258045c9a759940ae7a7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:     9944 b5f469592bb45ae907c251aa762e5cdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum: 13785644 b44ad17d6469962e8ad89a36e0069b0a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum:   155614 df66fe84dfcd04edc663ecfc295d5a60


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge3_s390.deb      Size/MD5 checksum:   993502 707589c970f190bed95035dad442b9d3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  4578888 53c705bdfebbd3e6985807f041e94612
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2970498 9c2e84a24bb629db2544929cf19f2087
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2778530 d7d6115aa9292ff635476cd2b17bf499


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:  2024732 192d85db979604781d849025a1f44ef2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  6546074 5865128021dbbc98f9a6c20e6fc574d9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  6379672 b308de13ac8b140e4a4d06ccd500b9e6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  3787334 543e98f2a917fbc57bf8a02c580491eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   165654 db2c3fd02eb51afbc1ccc98152a25784
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   202328 7df862f501733bef8450ba2bacc97b2a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   203806 5f0bc79951ced443e6ef009010b679f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   163860 ccb65e6e653600dfdbe81fb9f0839789
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:     9496 00a3aaa8a2c3cb84274e1155d0663fd1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  3601802 050ad637bd78c94c8819e553a50b51ae


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEkE03Xm3vHE4uyloRAgWkAKCizwMprLUoRTgrm24rKhy0Aq2KBgCfXUZW
VtJv32nxyaV0CN7g+A8yj7o=
=Y5TI
-----END PGP SIGNATURE-----

    

- 漏洞信息

25697
Linux Kernel Netfilter do_add_counters() Function Local Memory Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Unknown Vendor Verified

- 漏洞描述

The Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because of a race condition in the Linux netfilter code. The 'do_add_counters()' function in 'net/ipv4/netfilter/arp_tables.c' and 'net/ipv6/netfilter/arp_tables.c' lacks a check for a parameter that might allow 'IPT_ENTRY_ITERATE()' to read beyond its intended boundaries, potentially accessing sensitive kernel memory and hence resulting in a loss of confidentiality.

- 时间线

2006-05-22 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.4.33, 2.6.16.17 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Linux Kernel Netfilter Do_Add_Counters Local Race Condition Vulnerability
Race Condition Error 18113
No Yes
2006-05-26 12:00:00 2007-02-05 04:58:00
Solar Designer discovered this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 sparc
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS sparc
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Turbolinux Turbolinux Server 8.0
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Linux kernel 2.6.16 13
Linux kernel 2.6.16 .9
Linux kernel 2.6.16 .8
Linux kernel 2.6.16 .7
Linux kernel 2.6.16 .5
Linux kernel 2.6.16 .4
Linux kernel 2.6.16 .3
Linux kernel 2.6.16 .2
Linux kernel 2.6.16 .16
Linux kernel 2.6.16 .12
Linux kernel 2.6.16 .11
Linux kernel 2.6.16 .1
Linux kernel 2.6.16 -rc1
Linux kernel 2.6.16
Linux kernel 2.6.15 .6
Linux kernel 2.6.15 .4
Linux kernel 2.6.15 .3
Linux kernel 2.6.15 .2
Linux kernel 2.6.15 .1
Linux kernel 2.6.15 -rc6
Linux kernel 2.6.15 -rc5
Linux kernel 2.6.15 -rc4
Linux kernel 2.6.15 -rc3
Linux kernel 2.6.15 -rc2
Linux kernel 2.6.15 -rc1
Linux kernel 2.6.15
Linux kernel 2.6.14 .5
Linux kernel 2.6.14 .4
Linux kernel 2.6.14 .3
Linux kernel 2.6.14 .2
Linux kernel 2.6.14 .1
Linux kernel 2.6.14 -rc4
Linux kernel 2.6.14 -rc3
Linux kernel 2.6.14 -rc2
Linux kernel 2.6.14 -rc1
Linux kernel 2.6.14
Linux kernel 2.6.13 .4
Linux kernel 2.6.13 .3
Linux kernel 2.6.13 .2
Linux kernel 2.6.13 .1
Linux kernel 2.6.13 -rc7
Linux kernel 2.6.13 -rc6
Linux kernel 2.6.13 -rc4
Linux kernel 2.6.13 -rc1
Linux kernel 2.6.13
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.12
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.6.15.5
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya SES 3.0
Avaya SES 2.0
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8710 CM 3.1
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8700 CM 3.1
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8500 CM 3.1
Avaya S8500 0
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya S8300 CM 3.1
Avaya S8300 0
Avaya Messaging Storage Server MM3.0
Avaya CCS 3.0
Avaya CCS 2.0
Linux kernel 2.6.16 .17

- 不受影响的程序版本

Linux kernel 2.6.16 .17

- 漏洞讨论

The Linux kernel is susceptible to a local race-condition vulnerability.

This issue allows local attackers to gain access to potentially sensitive kernel memory, aiding them in further attacks. Failed exploit attempts may crash the kernel, denying service to legitimate users.

This issue is exploitable only by local users who have superuser privileges or have the CAP_NET_ADMIN capability. This issue is therefore a security concern only if computers run virtualization software that allows users to have superuser access to guest operating systems or if the CAP_NET_ADMIN capability is given to untrusted users.

Linux kernel versions prior to 2.6.16.17 in the 2.6 series are affected by this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Linux kernel version 2.6.16.17 has been released to address this issue.

Please see the referenced vendor advisories for more information.


Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test10

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站