CVE-2006-1242
CVSS5.0
发布时间 :2006-03-15 12:06:00
修订时间 :2011-03-07 21:32:30
NMCOPS    

[原文]The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.


[CNNVD]Linux Kernel IP ID信息泄露漏洞(CNNVD-200603-271)

        Linux 2.6.16 之前版本2.4.x和2.6.x中的ip_push_pending_frames函数,当收到未经审核的TCP SYN-ACK包后发送一条RST时,增加了一个IP ID字段,从而远程攻击者可实施一条Idle Scan (nmap -sI)攻击,该攻击可绕过针对此类攻击的保护。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.12.2Linux Kernel 2.6.12.2
cpe:/o:linux:linux_kernel:2.6.0:test2Linux Kernel 2.6 test2
cpe:/o:linux:linux_kernel:2.6.1Linux Kernel 2.6.1
cpe:/o:linux:linux_kernel:2.6.14:rc4Linux Kernel 2.6.14 Release Candidate 4
cpe:/o:linux:linux_kernel:2.4.27Linux Kernel 2.4.27
cpe:/o:linux:linux_kernel:2.6.11.6Linux Kernel 2.6.11.6
cpe:/o:linux:linux_kernel:2.4.24_ow1
cpe:/o:linux:linux_kernel:2.4.23:pre9Linux Kernel 2.4.23 pre9
cpe:/o:linux:linux_kernel:2.4.0:test3Linux Kernel 2.4.0 test3
cpe:/o:linux:linux_kernel:2.6.0:test1Linux Kernel 2.6 test1
cpe:/o:linux:linux_kernel:2.6.14.2Linux Kernel 2.6.14.2
cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.13:rc1Linux Kernel 2.6.13 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.0:test11Linux Kernel 2.6 test11
cpe:/o:linux:linux_kernel:2.6.9:2.6.20
cpe:/o:linux:linux_kernel:2.6.0:test6Linux Kernel 2.6 test6
cpe:/o:linux:linux_kernel:2.6.13:rc7Linux Kernel 2.6.13 Release Candidate 7
cpe:/o:linux:linux_kernel:2.6.15Linux Kernel 2.6.15
cpe:/o:linux:linux_kernel:2.4.29:rc2Linux Kernel 2.4.29 rc2
cpe:/o:linux:linux_kernel:2.4.32Linux Kernel 2.4.32
cpe:/o:linux:linux_kernel:2.4.12Linux Kernel 2.4.12
cpe:/o:linux:linux_kernel:2.4.0:test8Linux Kernel 2.4.0 test8
cpe:/o:linux:linux_kernel:2.6.15.3Linux Kernel 2.6.15.3
cpe:/o:linux:linux_kernel:2.6.13:rc4Linux Kernel 2.6.13 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.15:rc1Linux Kernel 2.6.15 Release Candidate 1
cpe:/o:linux:linux_kernel:2.4.19:pre3Linux Kernel 2.4.19 pre3
cpe:/o:linux:linux_kernel:2.4.23_ow2
cpe:/o:linux:linux_kernel:2.6.12:rc4Linux Kernel 2.6.12 Release Candidate 4
cpe:/o:linux:linux_kernel:2.4.3Linux Kernel 2.4.3
cpe:/o:linux:linux_kernel:2.4.23Linux Kernel 2.4.23
cpe:/o:linux:linux_kernel:2.4.0:test10Linux Kernel 2.4.0 test10
cpe:/o:linux:linux_kernel:2.4.30:rc2Linux Kernel 2.4.30 rc2
cpe:/o:linux:linux_kernel:2.4.30Linux Kernel 2.4.30
cpe:/o:linux:linux_kernel:2.6.12.1Linux Kernel 2.6.12.1
cpe:/o:linux:linux_kernel:2.4.0:test1Linux Kernel 2.4.0 test1
cpe:/o:linux:linux_kernel:2.4.27:pre2Linux Kernel 2.4.27 pre2
cpe:/o:linux:linux_kernel:2.6.8:rc3Linux Kernel 2.6.8 Release Candidate 3
cpe:/o:linux:linux_kernel:2.4.4Linux Kernel 2.4.4
cpe:/o:linux:linux_kernel:2.4.13Linux Kernel 2.4.13
cpe:/o:linux:linux_kernel:2.4.0:test12Linux Kernel 2.4.0 test12
cpe:/o:linux:linux_kernel:2.4.0:test2Linux Kernel 2.4.0 test2
cpe:/o:linux:linux_kernel:2.4.18:pre1Linux Kernel 2.4.18 pre1
cpe:/o:linux:linux_kernel:2.6.12:rc1Linux Kernel 2.6.12 Release Candidate 1
cpe:/o:linux:linux_kernel:2.4.32:pre2Linux Kernel 2.4.32 pre2
cpe:/o:linux:linux_kernel:2.6.14.4Linux Kernel 2.6.14.4
cpe:/o:linux:linux_kernel:2.4.20Linux Kernel 2.4.20
cpe:/o:linux:linux_kernel:2.4.19:pre4Linux Kernel 2.4.19 pre4
cpe:/o:linux:linux_kernel:2.4.0:test4Linux Kernel 2.4.0 test4
cpe:/o:linux:linux_kernel:2.4.27:pre4Linux Kernel 2.4.27 pre4
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.4.27:pre5Linux Kernel 2.4.27 pre5
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.4.21:pre7Linux Kernel 2.4.21 pre7
cpe:/o:linux:linux_kernel:2.6.0:test4Linux Kernel 2.6 test4
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0
cpe:/o:linux:linux_kernel:2.4.22Linux Kernel 2.4.22
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.12.3Linux Kernel 2.6.12.3
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.11.12Linux Kernel 2.6.11.12
cpe:/o:linux:linux_kernel:2.6.15.2Linux Kernel 2.6.15.2
cpe:/o:linux:linux_kernel:2.6.0:test8Linux Kernel 2.6 test8
cpe:/o:linux:linux_kernel:2.4.31:pre1Linux Kernel 2.4.31 pre1
cpe:/o:linux:linux_kernel:2.4.19:pre5Linux Kernel 2.4.19 pre5
cpe:/o:linux:linux_kernel:2.4.30:rc3Linux Kernel 2.4.30 rc3
cpe:/o:linux:linux_kernel:2.4.21Linux Kernel 2.4.21
cpe:/o:linux:linux_kernel:2.6.0:test10Linux Kernel 2.6 test10
cpe:/o:linux:linux_kernel:2.4.0:test6Linux Kernel 2.4.0 test6
cpe:/o:linux:linux_kernel:2.4.25Linux Kernel 2.4.25
cpe:/o:linux:linux_kernel:2.4.31Linux Kernel 2.4.31
cpe:/o:linux:linux_kernel:2.6.11:rc2Linux Kernel 2.6.11 Release Candidate 2
cpe:/o:linux:linux_kernel:2.4.1Linux Kernel 2.4.1
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.13.3Linux Kernel 2.6.13.3
cpe:/o:linux:linux_kernel:2.6.15:rc3Linux Kernel 2.6.15 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.15.1Linux Kernel 2.6.15.1
cpe:/o:linux:linux_kernel:2.4.17Linux Kernel 2.4.17
cpe:/o:linux:linux_kernel:2.4.14Linux Kernel 2.4.14
cpe:/o:linux:linux_kernel:2.6.0:test9Linux Kernel 2.6 test9
cpe:/o:linux:linux_kernel:2.4.10Linux Kernel 2.4.10
cpe:/o:linux:linux_kernel:2.4.18:pre5Linux Kernel 2.4.18 pre5
cpe:/o:linux:linux_kernel:2.6.0:test5Linux Kernel 2.6 test5
cpe:/o:linux:linux_kernel:2.6.13.2Linux Kernel 2.6.13.2
cpe:/o:linux:linux_kernel:2.4.28Linux Kernel 2.4.28
cpe:/o:linux:linux_kernel:2.6.14:rc3Linux Kernel 2.6.14 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.11:rc3Linux Kernel 2.6.11 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.11:rc4Linux Kernel 2.6.11 Release Candidate 4
cpe:/o:linux:linux_kernel:2.4.29:rc1Linux Kernel 2.4.29 rc1
cpe:/o:linux:linux_kernel:2.4.19:pre6Linux Kernel 2.4.19 pre6
cpe:/o:linux:linux_kernel:2.4.0:test7Linux Kernel 2.4.0 test7
cpe:/o:linux:linux_kernel:2.6.14:rc1Linux Kernel 2.6.14 Release Candidate 1
cpe:/o:linux:linux_kernel:2.4.21:pre1Linux Kernel 2.4.21 pre1
cpe:/o:linux:linux_kernel:2.4.27:pre3Linux Kernel 2.4.27 pre3
cpe:/o:linux:linux_kernel:2.4.18:pre3Linux Kernel 2.4.18 pre3
cpe:/o:linux:linux_kernel:2.4.32:pre1Linux Kernel 2.4.32 pre1
cpe:/o:linux:linux_kernel:2.6.0:test7Linux Kernel 2.6 test7
cpe:/o:linux:linux_kernel:2.4.5Linux Kernel 2.4.5
cpe:/o:linux:linux_kernel:2.6.13.1Linux Kernel 2.6.13.1
cpe:/o:linux:linux_kernel:2.4.19:pre2Linux Kernel 2.4.19 pre2
cpe:/o:linux:linux_kernel:2.6.12:rc5Linux Kernel 2.6.12 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.12.5Linux Kernel 2.6.12.5
cpe:/o:linux:linux_kernel:2.4.18::x86
cpe:/o:linux:linux_kernel:2.6.15.5Linux Kernel 2.6.15.5
cpe:/o:linux:linux_kernel:2.6.13.4Linux Kernel 2.6.13.4
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.4.18:pre7Linux Kernel 2.4.18 pre7
cpe:/o:linux:linux_kernel:2.4.0:test9Linux Kernel 2.4.0 test9
cpe:/o:linux:linux_kernel:2.6.14.5Linux Kernel 2.6.14.5
cpe:/o:linux:linux_kernel:2.6.12.6Linux Kernel 2.6.12.6
cpe:/o:linux:linux_kernel:2.4.2Linux Kernel 2.4.2
cpe:/o:linux:linux_kernel:2.6.12.4Linux Kernel 2.6.12.4
cpe:/o:linux:linux_kernel:2.4.0:test11Linux Kernel 2.4.0 test11
cpe:/o:linux:linux_kernel:2.6_test9_cvs
cpe:/o:linux:linux_kernel:2.6.14:rc2Linux Kernel 2.6.14 Release Candidate 2
cpe:/o:linux:linux_kernel:2.4.16Linux Kernel 2.4.16
cpe:/o:linux:linux_kernel:2.4.27:pre1Linux Kernel 2.4.27 pre1
cpe:/o:linux:linux_kernel:2.4.6Linux Kernel 2.4.6
cpe:/o:linux:linux_kernel:2.6.11.8Linux Kernel 2.6.11.8
cpe:/o:linux:linux_kernel:2.4.24Linux Kernel 2.4.24
cpe:/o:linux:linux_kernel:2.4.7Linux Kernel 2.4.7
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.13Linux Kernel 2.6.13
cpe:/o:linux:linux_kernel:2.4.18:pre4Linux Kernel 2.4.18 pre4
cpe:/o:linux:linux_kernel:2.6.8:rc2Linux Kernel 2.6.8 Release Candidate 2
cpe:/o:linux:linux_kernel:2.4.11Linux Kernel 2.4.11
cpe:/o:linux:linux_kernel:2.4.33:pre1Linux Kernel 2.4.33 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre8Linux Kernel 2.4.18 pre8
cpe:/o:linux:linux_kernel:2.4.19Linux Kernel 2.4.19
cpe:/o:linux:linux_kernel:2.6.11.5Linux Kernel 2.6.11.5
cpe:/o:linux:linux_kernel:2.6.10:rc2Linux Kernel 2.6.10 Release Candidate 2
cpe:/o:linux:linux_kernel:2.4.18:pre6Linux Kernel 2.4.18 pre6
cpe:/o:linux:linux_kernel:2.4.21:pre4Linux Kernel 2.4.21 pre4
cpe:/o:linux:linux_kernel:2.4.9Linux Kernel 2.4.9
cpe:/o:linux:linux_kernel:2.4.18Linux Kernel 2.4.18
cpe:/o:linux:linux_kernel:2.4.8Linux Kernel 2.4.8
cpe:/o:linux:linux_kernel:2.4.0:test5Linux Kernel 2.4.0 test5
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.15.4Linux Kernel 2.6.15.4
cpe:/o:linux:linux_kernel:2.6.8:rc1Linux Kernel 2.6.8 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.11Linux Kernel 2.6.11.11
cpe:/o:linux:linux_kernel:2.4.19:pre1Linux Kernel 2.4.19 pre1
cpe:/o:linux:linux_kernel:2.4.18:pre2Linux Kernel 2.4.18 pre2
cpe:/o:linux:linux_kernel:2.6.11.7Linux Kernel 2.6.11.7
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.14Linux Kernel 2.6.14
cpe:/o:linux:linux_kernel:2.4.26Linux Kernel 2.4.26
cpe:/o:linux:linux_kernel:2.6.0:test3Linux Kernel 2.6 test3
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.14.1Linux Kernel 2.6.14.1
cpe:/o:linux:linux_kernel:2.6.14.3Linux Kernel 2.6.14.3
cpe:/o:linux:linux_kernel:2.6.13:rc6Linux Kernel 2.6.13 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.4.29Linux Kernel 2.4.29
cpe:/o:linux:linux_kernel:2.4.0Linux Kernel 2.4.0
cpe:/o:linux:linux_kernel:2.4.15Linux Kernel 2.4.15

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10317The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving uns...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1242
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-271
(官方数据源) CNNVD

- 其它链接及资源

http://secunia.com/advisories/19402
(VENDOR_ADVISORY)  SECUNIA  19402
http://www.vupen.com/english/advisories/2006/2554
(UNKNOWN)  VUPEN  ADV-2006-2554
http://www.vupen.com/english/advisories/2006/1140
(UNKNOWN)  VUPEN  ADV-2006-1140
http://www.securityfocus.com/bid/17109
(UNKNOWN)  BID  17109
http://www.securityfocus.com/archive/1/archive/1/427893/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060316 Re: Linux zero IP ID vulnerability?
http://www.securityfocus.com/archive/1/archive/1/427753/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060315 Re: Linux zero IP ID vulnerability?
http://www.securityfocus.com/archive/1/archive/1/427622/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060314 Linux zero IP ID vulnerability?
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.1
(UNKNOWN)  CONFIRM  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.1
http://www.ubuntulinux.org/support/documentation/usn/usn-281-1
(UNKNOWN)  UBUNTU  USN-281-1
http://www.securityfocus.com/archive/1/archive/1/428605/30/6210/threaded
(UNKNOWN)  BUGTRAQ  20060323 Re: Linux zero IP ID vulnerability?
http://www.redhat.com/support/errata/RHSA-2006-0575.html
(UNKNOWN)  REDHAT  RHSA-2006:0575
http://www.redhat.com/support/errata/RHSA-2006-0437.html
(UNKNOWN)  REDHAT  RHSA-2006:0437
http://www.novell.com/linux/security/advisories/2006-05-31.html
(UNKNOWN)  SUSE  SUSE-SA:2006:028
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
(UNKNOWN)  MANDRIVA  MDKSA-2006:086
http://www.debian.org/security/2006/dsa-1103
(UNKNOWN)  DEBIAN  DSA-1103
http://www.debian.org/security/2006/dsa-1097
(UNKNOWN)  DEBIAN  DSA-1097
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://secunia.com/advisories/22417
(UNKNOWN)  SECUNIA  22417
http://secunia.com/advisories/21983
(UNKNOWN)  SECUNIA  21983
http://secunia.com/advisories/21465
(UNKNOWN)  SECUNIA  21465
http://secunia.com/advisories/21136
(UNKNOWN)  SECUNIA  21136
http://secunia.com/advisories/20914
(UNKNOWN)  SECUNIA  20914
http://secunia.com/advisories/20671
(UNKNOWN)  SECUNIA  20671
http://secunia.com/advisories/20398
(UNKNOWN)  SECUNIA  20398
http://secunia.com/advisories/20157
(UNKNOWN)  SECUNIA  20157
http://secunia.com/advisories/19955
(UNKNOWN)  SECUNIA  19955

- 漏洞信息

Linux Kernel IP ID信息泄露漏洞
中危 设计错误
2006-03-15 00:00:00 2006-04-26 00:00:00
远程  
        Linux 2.6.16 之前版本2.4.x和2.6.x中的ip_push_pending_frames函数,当收到未经审核的TCP SYN-ACK包后发送一条RST时,增加了一个IP ID字段,从而远程攻击者可实施一条Idle Scan (nmap -sI)攻击,该攻击可绕过针对此类攻击的保护。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Linux kernel 2.6 -test6
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6 -test4
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6 -test2
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6 -test9-CVS
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6 -test7
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6 -test9
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6 -test10
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6.1 -rc2
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6.1
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6.10 rc2
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Linux kernel 2.6.10
        Linux linux-2.6.16.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.16.1.tar.bz2
        Ubuntu acpi-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi -modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
        Ubuntu acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi -modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
        Ubuntu affs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs -modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
        Ubuntu affs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs -modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
        Ubuntu affs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs -modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
        Ubuntu cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
        Ubuntu cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
        Ubuntu cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
        Ubuntu cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
        Ubuntu cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
        Ubuntu cdrom-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdro m-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
        Ubuntu ext2-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2 -modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
        Ubuntu ext2-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2 -modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
        Ubuntu ex

- 漏洞信息 (F48071)

Mandriva Linux Security Advisory 2006.116 (PacketStormID:F48071)
2006-07-09 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2005-3359,CVE-2005-3784,CVE-2005-3858,CVE-2005-4618,CVE-2006-0096,CVE-2006-0555,CVE-2006-1242,CVE-2006-1525,CVE-2006-1528,CVE-2006-1855,CVE-2006-1856,CVE-2006-2071,CVE-2006-2271,CVE-2006-2272,CVE-2006-2444
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-116 - A ridiculous number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:116
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : July 5, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to 2.6.14, the atm module allows local users to cause a Denial of
 Service (panic) via certain socket calls that produce inconsistent
 reference counts for loadable protocol modules (CVE-2005-3359).
 
 Prior to 2.6.15, the auto-reap child processes included processes with
 ptrace attached, leading to a dangling ptrace reference and allowing
 local users to cause a Denial of Service (crash) (CVE-2005-3784).
 
 Prior to and including 2.6.12, a memory leak in the ip6_input_finish
 function could allow an attacker to cause a Denial of Service via
 malformed IPv6 packets with unspecified parameter problems, which
 prevents SKB from being freed (CVE-2005-3858).
 
 Prior to 2.6.15, a buffer overflow in sysctl could allow a local user
 to corrupt user memory and possibly cause a Denial of Service via a
 long string, causing sysctl to write a zero byte outside the buffer
 (CVE-2005-4618).
 
 Prior to 2.6.11, wan/sdla.c does not require CAP_SYS_RAWIO privilege
 for an SDLA firmware upgrade, with unknown impact and local attack
 vectors (CVE-2006-0096).
 
 Prior to 2.6.15.5, a local user could cause a Denial of Service (NFS
 client panic) via unknown attack vectors related to the use of O_DIRECT
 (direct I/O) (CVE-2006-0555).
 
 Prior to 2.6.16, the ip_push_pending_frames function increments the IP
 ID field when sending a RST after receiving unsolicited TCP SYN-ACK
 packets, which allows a remote attacker to conduct an idle scan attack,
 bypassing any intended protection against such an attack
 (CVE-2006-1242).
 
 Prior to 2.6.16.8, the ip_route_input function allows local users to
 cause a DoS (panic) via a request for a route for a multicast IP
 address, which triggers a null dereference (CVE-2006-1525).
 
 Prior to 2.6.13, local users could cause a Denial of Service (crash)
 via a dio transfer from the sg driver to memory mapped IO space
 (CVE-2006-1528).
 
 Prior to 2.6.11.12, the choose_new_parent function includes certain
 debugging code which could allow a local user to cause a Denial of
 Service (panic) by causing certain circumstances involving termination
 of a parent process (CVE-2006-1855).
 
 Prior to and including 2.6.16, the kernel did not add the appropriate
 LSM file_permission hooks to the readv and writev functions, which
 could allow an attacker to bypass intended access restrictions
 (CVE-2006-1856).
 
 Prior to 2.6.16, local users can bypass IPC permissions and modify a
 read-only attachment of shared memory by using mprotect to give write
 permission to the attachment (CVE-2006-2071).
 
 Prior to 2.6.17, the ECNE chunk handling in SCTP (lksctp) allows remote
 attackers to cause a DoS (kernel panic) via an unexpected chucnk when
 the session is in CLOSED state (CVE-2006-2271).
 
 Prior to 2.6.17, SCTP (lksctp) allows remote attacker to cause a DoS
 (kernel panic) via incoming IP fragmented COOKIE_ECHO and HEARTBEAT
 SCTP control chunks (CVE-2006-2272).
 
 Memory corruption can be triggered remotely when the ip_nat_snmp_basic
 module is loaded and traffic on port 161 or 162 is NATed
 (CVE-2006-2444).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3359
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4618
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0096
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0555
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1525
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1855
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1856
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2271
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2272
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 a5f9a1061112afa86f10ec1bdc9d49f0  corporate/3.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.i586.rpm
 edf706536ecb71300eb53c42838dfb7f  corporate/3.0/RPMS/kernel-BOOT-2.6.3.32mdk-1-1mdk.i586.rpm
 27be129a647b32dab207593327cfbdb0  corporate/3.0/RPMS/kernel-enterprise-2.6.3.32mdk-1-1mdk.i586.rpm
 25df51c79bda0995e1ab5e626bed3365  corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.32mdk-1-1mdk.i586.rpm
 9d6f94621c8d02ea4a2378575b9150b8  corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.32mdk-1-1mdk.i586.rpm
 0a15845463acdec596ba4b02e718087e  corporate/3.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.i586.rpm
 6cd61286a7e3aac569186465e6d37e67  corporate/3.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.i586.rpm
 4b1b11ed7ea70b3119eab29783739f06  corporate/3.0/RPMS/kernel-source-2.6.3-32mdk.i586.rpm
 ae918285bd5b813d3dbac4dc180c0d6d  corporate/3.0/RPMS/kernel-source-stripped-2.6.3-32mdk.i586.rpm
 a4632a1ebf83f95f547d266abaad2106  corporate/3.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 cb09cd5187a99ea139bf82783bd184a4  x86_64/corporate/3.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.x86_64.rpm
 139e7d1dedffe1f4f44c6e988b5c4ef2  x86_64/corporate/3.0/RPMS/kernel-BOOT-2.6.3.32mdk-1-1mdk.x86_64.rpm
 f8d744824c238b071eafda67136592ae  x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.x86_64.rpm
 0ab64016fffb13934347e3d5cba2b45e  x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.x86_64.rpm
 437cfd7b69813e44cda4e0fe6e091521  x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-32mdk.x86_64.rpm
 dee29e29dc05f364ceb389144144c469  x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-32mdk.x86_64.rpm
 a4632a1ebf83f95f547d266abaad2106  x86_64/corporate/3.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 3d6ff857e798601ce4cf62c16e29ed42  mnf/2.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.i586.rpm
 94ea4314713ca6a39120a066b9dd9b59  mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.32mdk-1-1mdk.i586.rpm
 694ad7fad48ec9a0b0bdb6a7b1e94148  mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.32mdk-1-1mdk.i586.rpm
 d602f9f1e991794a1cedb21e1b87e949  mnf/2.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.i586.rpm
 c7a984793f0f81d33bedd18eebd34228  mnf/2.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.i586.rpm
 81a4bfaab9d2a45a8500f2741f1db6a5  mnf/2.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEq9cGmqjQ0CJFipgRAjRFAKDkoTvT4ht14u+E3EyZYDadNRql8wCgoiNp
ycOpCb9cZ6HIXDL0KeZwIDc=
=5WcB
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47794)

Debian Linux Security Advisory 1103-1 (PacketStormID:F47794)
2006-06-27 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2005-3359,CVE-2006-0038,CVE-2006-0039,CVE-2006-0456,CVE-2006-0554,CVE-2006-0555,CVE-2006-0557,CVE-2006-0558,CVE-2006-0741,CVE-2006-0742,CVE-2006-0744,CVE-2006-1056,CVE-2006-1242,CVE-2006-1368,CVE-2006-1523,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857
[点击下载]

Debian Security Advisory 1103-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1103-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 27th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.6.8
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2005-3359 CVE-2006-0038 CVE-2006-0039 CVE-2006-0456
                 CVE-2006-0554 CVE-2006-0555 CVE-2006-0557 CVE-2006-0558
                 CVE-2006-0741 CVE-2006-0742 CVE-2006-0744 CVE-2006-1056
                 CVE-2006-1242 CVE-2006-1368 CVE-2006-1523 CVE-2006-1524
                 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 CVE-2006-1863
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2005-3359

    Franz Filz discovered that some socket calls permit causing inconsistent
    reference counts on loadable modules, which allows local users to cause
    a denial of service.
    
CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of kernel
    memory by exploiting a race condition. Likewise, it requires CAP_NET_ADMIN
    privileges. 

CVE-2006-0456

    David Howells discovered that the s390 assembly version of the
    strnlen_user() function incorrectly returns some string size values.

CVE-2006-0554

    It was discovered that the ftruncate() function of XFS can expose
    unallocated, which allows information disclosure of previously deleted
    files.

CVE-2006-0555

    It was discovered that some NFS file operations on handles mounted with
    O_DIRECT can force the kernel into a crash.

CVE-2006-0557

    It was discovered that the code to configure memory policies allows
    tricking the kernel into a crash, thus allowing denial of service.

CVE-2006-0558

    It was discovered by Cliff Wickman that perfmon for the IA64
    architecture allows users to trigger a BUG() assert, which allows
    denial of service.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad elf entry
    address.

CVE-2006-0742

    Alan and Gareth discovered that the ia64 platform had an
    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-0744

    The Linux kernel did not properly handle uncanonical return
    addresses on Intel EM64T CPUs, reporting exceptions in the SYSRET
    instead of the next instruction, causing the kernel exception
    handler to run on the user stack with the wrong GS. This may result
    in a DoS due to a local user changing the frames.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1523

    Oleg Nesterov reported an unsafe BUG_ON call in signal.c which was
    introduced by RCU signal handling. The BUG_ON code is protected by
    siglock while the code in switch_exit_pids() uses tasklist_lock. It
    may be possible for local users to exploit this to initiate a denial
    of service attack (DoS).

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1863

    Mark Mosely discovered that chroots residing on an CIFS share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.


The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.6.8-16sarge3
     Alpha architecture          2.6.8-16sarge3
     HP Precision architecture   2.6.8-6sarge3
     Intel IA-32 architecture    2.6.8-16sarge3
     Intel IA-64 architecture    2.6.8-14sarge3
     Motorola 680x0 architecture 2.6.8-4sarge3
     PowerPC architecture        2.6.8-12sarge3
     IBM S/390 architecture      2.6.8-5sarge3
     Sun Sparc architecture      2.6.8-15sarge3

Due to technical problems the built amd64 packages couldn't be processed
by the archive script. Once this problem is resolved, an updated DSA 1103-2
will be sent out with the checksums for amd64.

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3.dsc
      Size/MD5 checksum:     1002 c13d8ebcabab9477e9dbf7a5d66fa4d4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3.diff.gz
      Size/MD5 checksum:  1043822 9dc3ae088c90a7be470b9436ca317fcc
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
      Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge3.dsc
      Size/MD5 checksum:      812 822e18074a76927a0a91c83916c991bb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge3.tar.gz
      Size/MD5 checksum:    39108 45f3b6b40470a81768f113160754fdbd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge3.dsc
      Size/MD5 checksum:     1008 6fa522a94872155497a0e057a05f8b61
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge3.tar.gz
      Size/MD5 checksum:    67361 863b56c6386182f58fda2054099e9e52
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge3.dsc
      Size/MD5 checksum:     1047 294c981159570b5253bc877ce0543b12
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge3.tar.gz
      Size/MD5 checksum:    90731 3215b0f2a0dc926db6e05b04ff5760ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge3.dsc
      Size/MD5 checksum:     1191 e26e2149236092d9227773a904eaed04
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge3.tar.gz
      Size/MD5 checksum:    64130 03de4cad1ccfa5ce38f5b4b97b71f5ad
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge3.dsc
      Size/MD5 checksum:      874 2e925606f9143b774ab2e86a12d62c44
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge3.tar.gz
      Size/MD5 checksum:    15464 7dfeb923284a92f3bca5e8ef62a52498
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge3.dsc
      Size/MD5 checksum:     1071 9e2657e0a79bd6b3cde0df2e5c9aa77e
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge3.tar.gz
      Size/MD5 checksum:    26926 5f6c84921c0f6041fdd269a6c66a0568
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge3.dsc
      Size/MD5 checksum:      846 89d3a1f59fb514c8c5a195e91eaa1997
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge3.tar.gz
      Size/MD5 checksum:    12972 e3c65e0b2998dad3c440a0c1af5cd99f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge3.dsc
      Size/MD5 checksum:     1036 31e7168c06b98e03789c100b6a6fcf67
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge3.tar.gz
      Size/MD5 checksum:    24369 6c9e2b0e3a3f625cc4103b385f0c093c


  Architecture independent components:

    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:  6184022 54432fcfa3a56c502b0feabe6723c467
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:  1079878 a2ca885ba3b9b30d211c26647524cbc9
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum: 34941458 74c1b17e994280ac14d7116a52b771bf
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge3_all.deb
      Size/MD5 checksum:    35082 7b08d82ec9046359cd85ea87aad96995
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge3_all.deb
      Size/MD5 checksum:    10934 0d1c81689deeaa145be9e4d3ae140a81


  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:  2757876 e94cdb8d12552d293018c7ca24199f47
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   230608 fdf2cc6f010f2b618672422c3293f3b9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum:   225502 2a21bf8197792a789420b1838526186f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:  2759828 544e1f44b4cebfaf97f4ae1870b56ab1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:   232152 9ba670970518572ad7db755e7888ee8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum:   227100 a836d721852b11fa6422f33dc81a5415
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
      Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum: 20220874 d9c1642300f72cc5f3fc3b04865b3b3d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge3_alpha.deb
      Size/MD5 checksum: 20073352 1faa9472c15dd6142221fec2261b5628


  HP Precision architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:  2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   209500 8b284495343adf74bca8219421f4b48d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208722 941a680674931ec594e3512c5736c9bf
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   208356 7ab2df2b04391d75500083585a96701b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum:   207502 0a840281a00f4762978af411d7a3e7fb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:  2802244 f82eaa9411813bbdee2e0c268a067c81
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   211350 c221830c715cfebb1acb383d8f7c6a8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   210570 96c096a16a6291f4b40716ac939bd063
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   210220 fc6c20856e898e4bd881711e6392d4e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum:   209468 6a00248dcf25809f02f7ab585429f27b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
      Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 16029232 665d462c1fae45714ff948289c8a3457
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 16927312 a69c9e976ab6810bf7043a15daa1dd29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 17480298 66e35e40e7e2d82370f7ccba7544a59a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge3_hppa.deb
      Size/MD5 checksum: 18306822 88ade3c07fc414c82bf589def0bda600


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:  2777236 af649947c652a9486461b92bbc33be8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   256920 88db1b684f215fdd35de0989f148b57f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254646 553205bb17cfc57f4c4a7aadff46650a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251590 51ebd6202b7f347f66df0e189b2a3946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   254818 746967059979238eb49cfdcba572c07b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum:   251708 33a61355c7a48d87b7570b772e454760
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:  2779348 210a335431d029842eb82036d5326edf
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   258446 1d48b727a22487e4b34f4894b2a9a7f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   256322 8f73439c2a920c66ae05d3ceba45229a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   253564 4ce8f253c15562e9d11a985e135d94b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   256504 5a5c2acd3ef2fb3764489ed77865739e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum:   253486 48f046411662bdde50195f8bdb421efa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
      Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 14063774 13d8810b179bb8408645e7fab57d114a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15536484 0a47b2f9fc33d4b7a52eb68b54419c82
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15346402 fffd9fb96343167ccc32356fa307152a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15261026 cbdee84292a612fddca022377e38eebb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge3_i386.deb
      Size/MD5 checksum: 15124168 248b85e7c59930aeb63fda6a0366b9a2


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6606 27049d0c329dc1cad092b2d53c3322ec
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6678 f3967dddbec5691733d49246d09f8cb3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6638 acc1b57c5a246304f9cee279574811e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6706 5c28f912ecc42291a9ec3ef0f13c6041
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:  3097054 691f7cd4d1b2f184e50ab566f20a13e4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198662 72e0e4b4331b8a600de3a98d6ac59a82
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197920 6e19efeac81a2a9416328af58316c4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   198394 6d946fcc7b1fcf88c9ee9a47f7015384
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum:   197828 8be7e8290bd8e7cf1b9c162c9e369b36
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:  3098862 aee4e1b99a34047fbf47941e2dced300
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199934 484af4636ad4d64ecbf89dd7b47cda03
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199302 8b6e3253f9c04054e1e9d2066e4323c0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199582 8b97de7837305ad8728bc0ab4bfeccb1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:   199190 508601b56facbca5211e2e3f1a819d4e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6602 dea61776e4279d8906f3d552af3ed55c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6670 d8ab34493a8cfc857dccd8a84743017a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6630 04e4d5b971ec3523b80a3f2373afbf73
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum:     6700 f5cc48a00ca305eaea622738ce0d6570
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
      Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 21476428 ec3548487a558e67913419b84c84999c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 22133136 0d6292568fadcc40f65e87314315165c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 21408908 539197e6af86ff9583cf43d12ad109b1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge3_ia64.deb
      Size/MD5 checksum: 22154322 a4ae9740b9459b0a43c47b5b6e546515


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3305628 8029426256d755ea724ed7b46243c1ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3101728 677b103a57ce6de26b072245dfd585f7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3014324 f7a8e8b9c7d4eacecd1f1d69f1ee2c34
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2986734 fd1f14cc2856a55bb6948bdf956ea0d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3173334 e32fa0fd9460b9e19bd24c8cc413684f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2978518 6e682497437fa9d1912ea5fd3374c82f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3047534 f9daecf9203da30c95cd9ab9647d8c54
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  3108200 9a81b37d60bdcf95d6cbc3ca5eb83d1a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge3_m68k.deb
      Size/MD5 checksum:  2992046 cfae06d516a2695eb961e574570661a4


  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   407330 3025ba5c61db0cd42b9d0ab1a3e01b1c
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406624 21742d40c3c0bac0d64e970c0944c59f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406548 b9ce59161b3faf818f77239a468828e4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406518 e40256427db90a027ed2be8a7b50997c
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   406882 c899bf1d81895ee43306a8b19e3c8ee8
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:   407320 45108a12629a9eddd40b071db4b92e4e
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405670 bd347754ea8c4cee14686b207e6cf46d
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405666 1dec752373178a4aef51f74c6d917073
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405598 c39f371744ca92eec853ad8746f0f009
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405568 b346b94897fca3c678daadc99b515428
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405912 14475ec4cdc9b337ad2dc0ab3a772bdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:   405698 4c3c94aa9afb4e6d73986bbfa26484bb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum:  5143830 3a6cd285eba77baae74a2a16f8029be2
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum:  5147620 32c5daf3656ab15416c3a42a5be21afc
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13577038 981f85ad155781610e2069f28b1eb4e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13929444 b11a91f117e0d25b6df7a56cd2c0f0d6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13560822 44f1276a6cd811646ebf3ccb2da06067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13920572 fd32c8d3f0dbb55430075b57546f9390
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13594454 93d70ceed88a16e7af0fe3db1a2c5baa
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge3_powerpc.deb
      Size/MD5 checksum: 13847204 5f22d24e351ce6040f9fa995e5a7906a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
      Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  5083010 42c4dd8c6c67ce7940f0d24bb745385c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  5087230 aa48eb8b2a3a5f215bba97329947a2eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  2973758 c8d12dd2fbddca3ab1b7bd905de4a90c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  1140118 328edfc2944127e2f1d6dca1842ce51d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
      Size/MD5 checksum:  3179326 487c36323990a6ae1119f4c30f16cdd9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  2977844 c491248ed7d4c71415be782f7fbe77e9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  1142366 fddcd4821b89cbf30f47d5df380f2961
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge3_s390.deb
      Size/MD5 checksum:  3186726 3eaf46617bf0ee1de50cad55f351aa54


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:     3462 c68f0624f124db25f3a41f78432ca11c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:     5194 b90da0337cb607278aa01d4ec0c19a3a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  2888690 29723527245a48a00e724c7366868ec9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   107974 788d40ca3a1a3f53b8b2cf4c1fc4badc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   142726 8719b1bf0d3aff36f7711d8979f87a7d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:   143332 87bc055c575e3ec3ea44136ed44dff6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  2890616 a3717a911c04df4af4917c5a0366a8de
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   109996 d42960c6242e6a62d5a2cb9809645bea
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   144710 f1c0a8b3bf641019d7831cc1277ba524
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:   145366 505e40a256abd9fa04a49321fba69115
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  4545570 00d7c7e1caef41efcbc198a282f2b9f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7428184 1f146c58f98331bf5826520379bacd33
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
      Size/MD5 checksum:  7622116 4de4c114879d82d79fc34cb93c070d43
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  4550972 ea3ec35673aed896ec9416a8f470bf77
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  7431000 fab9d693f9c9642b67e0d386f3df01ee
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge3_sparc.deb
      Size/MD5 checksum:  7628010 8c922a4190017515210c6738213b0782


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEoLqvXm3vHE4uyloRAmpRAKCEL2aSzNg4NCC7a4MgkE3gUS3dkQCfc3Dy
h9XpOeylbvWZtXWsn03PS0o=
=twOb
-----END PGP SIGNATURE-----






_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F47549)

Debian Linux Security Advisory 1097-1 (PacketStormID:F47549)
2006-06-21 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2006-0038,CVE-2006-0039,CVE-2006-0741,CVE-2006-0742,CVE-2006-1056,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857,CVE-2006-1858,CVE-2006-1864,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Debian Security Advisory 1097-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1097-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 14th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.4.27
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742
                 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368
                 CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274
Debian Bug     : 

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of
    kernel memory by exploiting a race condition. Like CVE-2006-0038,
    it requires CAP_NET_ADMIN privileges.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad ELF entry
    address.

CVE-2006-0742

    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1343

    Pavel Kankovsky reported the existance of a potential information leak
    resulting from the failure to initialize sin.sin_zero in the IPv4 socket
    code.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove() function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.



The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.4.27-10sarge3
     Alpha architecture          2.4.27-10sarge3
     ARM architecture            2.4.27-2sarge3
     Intel IA-32 architecture    2.4.27-10sarge3
     Intel IA-64 architecture    2.4.27-10sarge3
     Motorola 680x0 architecture 2.4.27-3sarge3
     Big endian MIPS             2.4.27-10.sarge3.040815-1
     Little endian MIPS          2.4.27-10.sarge3.040815-1
     PowerPC architecture        2.4.27-10sarge3
     IBM S/390 architecture      2.4.27-2sarge3
     Sun Sparc architecture      2.4.27-9sarge3

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2
     kernel-image-2.4.27-speakup 2.4.27-1.1sarge2
     mindi-kernel                2.4.27-2sarge2
     systemimager                3.2.3-6sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      831 fac953b669c78c37ea181597402b1c1b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    98672 717a42fcf8a6b67690a756b9f3f00aa1
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.diff.gz
      Size/MD5 checksum:     3962 fc1912f815afb314558fbadae87e43fc
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.tar.gz
      Size/MD5 checksum:    26319 368860bca1219d5777ab12dbc0713985
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1139 47ebcb365d37d7321eeee65b23920a29
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.dsc
      Size/MD5 checksum:      621 096115eaec61120211e0ba317b92def9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:    31646 1673537490a1af1a72ff1d65cd73139d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc
      Size/MD5 checksum:      876 2340c14db87e56a98e01dd17b095b7d4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
      Size/MD5 checksum:    21264 932ad64503240eedef626a0856fe5665
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1143 60abbaf01fa8d0f6ac0992eb08cb965e
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.dsc
      Size/MD5 checksum:      732 738178383acc2853cf8bd8b15861dc52
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.tar.gz
      Size/MD5 checksum: 15975839 9d7e6b12846c71e4d530375aacd1390b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:     9362 52942076ea9989d63ec619d0be8f324c
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      900 6a5fd70b803f4a0996b994d72d30c65e
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
      Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
      Size/MD5 checksum:     1051 e28f324bd15f8825721c36d2ad685f8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz
      Size/MD5 checksum:    11080 2813b0290efcd984fef6a69d9ca3c8e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:  1463783 1df6018893f9772d156ccf8e3080fb2b
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.+gz
      Size/MD5 checksum:   309066 ccf2db5585e30dd27b9eaf8d74285e70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      839 2f9746e3d73001a774607a2e8460dec8
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.dsc
      Size/MD5 checksum:      750 621fb9f1f76dc3fae5ed69f393ded2cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    54501 650afb6ddf33bd3c55d036c6e163f8d1
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
      Size/MD5 checksum:   741011 dc1085a42970fbb6f5174f8dae7f5bb2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1581 a0f54f9d6f61b4a31bdf49b2efa6a2ca
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.tar.gz
      Size/MD5 checksum:    17809 946929349518ac3d91c42825bfb6cabc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    31177 2d05a7a176dba04f37719199efa494b7
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
      Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      831 4aa4330d08a7829fbe9a548d1d8bab2f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
      Size/MD5 checksum:     1074 ef1ed7e19152004e160a48d320fed490
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.dsc
      Size/MD5 checksum:     1012 271d488ce319e95d567143228330e9a1


  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30482 64658643dc4a9554a722ff1b724c916f
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  4759092 15c5bd7f61d7291f1267c12733ffcb5b
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum: 31033502 47eb2bd29ad34555156eac2ec8160cd4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:    26664 88c43bac04065e47b6486bed94692e9e
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:  3580108 9542a6368e1668c0b3dd5529ba9c80f0
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   116802 a73dc8e6bb5119c7679d97d13b94cbc8
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30730 7cafd2b593e33cd0cb1ed5577a63142a
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge2_all.deb
      Size/MD5 checksum:  2419762 5e9e5072a78be7f12f2a499ee1116268
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    15944 00be5d0f60f2e89dec74ec2a76310638
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:   689772 9054c12e58f6b8c6d7f6055e94e3e2b3
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   631336 01476ba30e300b6b91a9a1a5d5c7f16b
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  9545000 c225981a19829b44b8b2e61beea177c2

 
  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge3_alpha.+deb
      Size/MD5 checksum:   272284 56ec516e9425c915a04a2a7184d15192
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge3_alpha.de+b
      Size/MD5 checksum: 16521602 4975ec76eb158179d36de7746cab88ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb      Size/MD5 checksum: 16966302 9bb2d088907ead2c2e689c139e945ef9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:  4573588 ad755c6e0a640be87f44d0eeb3cb0b9d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:     6930 5af591a1a57ca5b7b5ce7af39d0c30f8
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:   274064 b675644b9520620077d740f5033e311c


  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3145470 0e5c53017bbb7a84d554c1b6e60a0f6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3668438 2c00f060b5f4a599b1509e5625d766c1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  7331276 8ded6d50afd88d04fd9b601586509d32
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:   465160 61a35d05b6e9617ea9cec7ecc3ada43c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1692044 73cb9319b752cc5eaca4849e20edf6ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  4658994 b790e6512cd56ac98a1d9b5539c9d5b6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1056874 a03e9282e21db6a8094c8f2432a88e09


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12087676 c53fd67452bade39a41a4d07b1ddbd26
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   268890 b867a4d295e544fff9f5f0aa2a660762
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11713818 a039669989458b154e77063b9f2cd05e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_+i386.deb
      Size/MD5 checksum:   305120 bcbd70a2fc6c58ecf1ff373e398069bd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   300776 cba2acbaa7a11221bf20476dec02cc2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12340196 bb4547bd7a55cf5a863faf0eb787af72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:     9460 a52b72284e9b2ac4ea7249b9889dae97
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   293320 0cfddb9db531337f9220c787e2916002
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   299132 cf2755d7c9628bf753d4f9fc59df37f6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12682330 64e091ae35b42450a3f0af1af1b1cc17
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298354 03343347f66f3ebae64348769a8e7085
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298796 d5474dcad0aa041fa1bebffa5531a4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   298168 29f6f0af6edcc6fdc7b34fd33b4b45a6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   298236 251b20906cabdabc2689f8fad6238485
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11049672 7c1d176724d5af7ef5d92cf91a4b3a24
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.de+b
      Size/MD5 checksum:   300914 012fa2195bea70f63022c38ee8ece1b8
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2_i386.deb
      Size/MD5 checksum: 11992030 37b9f69b34c25ffd7f79c3dccb1c2b86
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:  1824238 b412dad8e3fa8ffbb88f9e24b720682c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   293678 293d14c82e8f2dc12d75d9ffbf07a497
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge2_i386.de+b
      Size/MD5 checksum:  4771964 810af192d449f6437de9c7b92bfc8f70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12420578 5699a644c8305231c6ff00ca615bc79a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   299016 8269e91daebb2aca7b360c15a41fa060
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12024800 595b16fd83e6ca0ca9b3b4df82934f72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   287484 80953396a754c47e76dc9c034fb2caab
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2_i386.deb
      Size/MD5 checksum:  7766984 0f4f4f9d1a0bc59ae4a2bf51734cfdfa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   299566 6165de4b3a2f79b3983d826f490f6c58
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb
      Size/MD5 checksum: 11303960 3519c2d9f88bcbbe6cd1a793bc21a092


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia+64.deb
      Size/MD5 checksum:   241990 1de0bc8938c45fdc763edc8b5be16dbb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.d+eb
      Size/MD5 checksum:   240416 d711a15e48958eaf0b0cffdb9afbe33b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb      Size/MD5 checksum: 16623356 6f87ed371e352b5ef736eeb9aea9b1e3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.+deb
      Size/MD5 checksum: 17020414 9748928c4403f7d1f708e4f1659ee56b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia6+4.deb
      Size/MD5 checksum:   241792 3f041268f31bbc7c13bb41f4b9b254d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64+.deb
      Size/MD5 checksum: 16980154 c21794a39eae3611d166574bc4d6c946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6188 510517c085a54b7f62b21fa549a28254
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6154 0ffa2668983b76eb117180f4127f443f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum: 16670542 5a5fc027a7ed1ea22de65134816ac27e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6372 9091687f1ccdd0a95238d4d8bf7a36b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6150 6862682a204020d9be7c3c7a24b58022
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:  4688294 fec3cf9e850845e1339b39eaadbfe411
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge3_ia64.de+b
      Size/MD5 checksum:   240852 525e38de6f834e7112097c26da92b929
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6178 c756f53c98ab21e53f097b2859433591


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2395830 74f11a8ca02e8a1cc776bf950e1d346b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2476584 4baad67d5c9bac3ee608a1f5b1d4dce0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2638370 76fcbcdc52016ae4feeafa765a3fc761
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2261274 baacace88b258a02d89ee5158269dc90
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2324432 202215777ec6ddca992a02551578bd20
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2543516 00b54f06d0e048692fec00cc8f888cf3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb      Size/MD5 checksum:  2395344 9326ce159e507c20e26fc4aa4ec9fa61


  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3852294 0b6ccfb76fed8400f453953d7421c2a6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3849540 57d70bee7ad3a52c2e41296a4b660748
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.de+b
      Size/MD5 checksum:  4681678 76bfca90e34781e213f64d92e412f7d2
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mips.deb
      Size/MD5 checksum:  7177648 16b29faa543ea16b0f0b1e4b79bcca92
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
      Size/MD5 checksum:    19330 f81dbe5f0089f55ccffdb5160fc14529


  Little endian MIPS architecture:
 

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mipsel.deb
      Size/MD5 checksum:  7040154 219d79c89034cc245aaedcc09c077253
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
      Size/MD5 checksum:    19372 f882ee84e76926b99370922778731da6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  3031408 2e21dc55f4e6c7d8e31485cab88b52a9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  2991822 83720b4706c20d32513fdc764e19a3db
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.+deb
      Size/MD5 checksum:  4686362 1e70d957d920f262ad64af693ead756d
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-+1_mipsel.deb
      Size/MD5 checksum:  4102944 4dcc900ca58f7d7e69f0020bb3237dda
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1+_mipsel.deb
      Size/MD5 checksum:  2137112 45fe0699fea23090cc4bc9368c6060e9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_m+ipsel.deb
      Size/MD5 checksum:  4670600 64746373b5c99a31c486fb360ec9048c
 

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:   155366 c357bb9b9fe6ce282b9bba63a0bdaec4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum: 13478728 3e7a96afb9b6bb0618a69d490d3df3e6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge3_powerp+c.deb
      Size/MD5 checksum:  4800960 668fb5a82d4ac36e66da1abff65e531f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum: 12750476 7f6aa3d1cc7c8990cf5ca2d8f5d5c128
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:     9868 61edb2922c82b932b5a51aabd4e3e962
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:    66712 0f1a666913413ccac067b519949b64be
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge3_powerpc.d+eb
      Size/MD5 checksum:  4683234 1dc1ed36b3052d676aece64519c79067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:   141276 627427945710a84e25f9a6e81cf52871
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:  1817290 168aae93e0888603a192acfb55c17ea4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:  2499398 6c3464992e5fd4f0c76bd6e456603b69
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum:   155380 29ef8c314e3ff4ad80a159e336f30cdd
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:   141508 23beb8633e1bc6c71cd7c85549ddc547
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:  4693350 489de2e942db258045c9a759940ae7a7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:     9944 b5f469592bb45ae907c251aa762e5cdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum: 13785644 b44ad17d6469962e8ad89a36e0069b0a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum:   155614 df66fe84dfcd04edc663ecfc295d5a60


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge3_s390.deb      Size/MD5 checksum:   993502 707589c970f190bed95035dad442b9d3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  4578888 53c705bdfebbd3e6985807f041e94612
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2970498 9c2e84a24bb629db2544929cf19f2087
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2778530 d7d6115aa9292ff635476cd2b17bf499


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:  2024732 192d85db979604781d849025a1f44ef2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  6546074 5865128021dbbc98f9a6c20e6fc574d9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  6379672 b308de13ac8b140e4a4d06ccd500b9e6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  3787334 543e98f2a917fbc57bf8a02c580491eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   165654 db2c3fd02eb51afbc1ccc98152a25784
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   202328 7df862f501733bef8450ba2bacc97b2a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   203806 5f0bc79951ced443e6ef009010b679f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   163860 ccb65e6e653600dfdbe81fb9f0839789
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:     9496 00a3aaa8a2c3cb84274e1155d0663fd1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  3601802 050ad637bd78c94c8819e553a50b51ae


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEkE03Xm3vHE4uyloRAgWkAKCizwMprLUoRTgrm24rKhy0Aq2KBgCfXUZW
VtJv32nxyaV0CN7g+A8yj7o=
=Y5TI
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F46107)

Ubuntu Security Notice 281-1 (PacketStormID:F46107)
2006-05-06 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,denial of service,overflow,kernel,local,tcp,vulnerability
linux,ubuntu
CVE-2006-0557,CVE-2006-1052,CVE-2006-1055,CVE-2006-1066,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1525
[点击下载]

Ubuntu Security Notice 281-1 - Multiple vulnerabilities have been discovered in the Linux 2.6 kernel. The sys_mbind() function did not properly verify the validity of the 'maxnod' argument. A local user could exploit this to trigger a buffer overflow, which caused a kernel crash. The SELinux module did not correctly handle the tracer SID when a process was already being traced. A local attacker could exploit this to cause a kernel crash. Al Viro discovered a local Denial of Service in the sysfs write buffer handling. By writing a block wit h a length exactly equal to the processor's page size to any writable file in /sys, a local attacker could cause a kernel crash. John Blackwood discovered a race condition with single-step debugging multiple processes at the same time. A local attacker could exploit this to crash the system. This only affects the amd64 platform. Marco Ivaldi discovered a flaw in the handling of the ID number of IP packets. This number was incremented after receiving unsolicited TCP SYN-ACK packets. A remote attacker could exploit this to conduct port scans with the 'Idle scan' method (nmap -sI), which bypassed intended port scan protections. Pavel Kankovsky discovered that the getsockopt() function, when called with an SO_ORIGINAL_DST argument, does not properly clear the returned structure, so that a random piece of kernel memory is exposed to the user. This could potentially reveal sensitive data like passwords or encryption keys. A buffer overflow was discovered in the USB Gadget RNDIS implementation. While creating a reply message, the driver did not allocate enough memory for the reply structure. A remote attacker could exploit this to cause a kernel crash. Alexandra Kossovsky discovered an invalid memory access in the ip_route_input() function. By using the 'ip' command in a particular way to retrieve multicast routes, a local attacker could exploit this to crash the kernel.

===========================================================
Ubuntu Security Notice USN-281-1	       May 04, 2006
linux-source-2.6.10, linux-source-2.6.12 vulnerabilities
CVE-2006-0557, CVE-2006-1052, CVE-2006-1055, CVE-2006-1066,
CVE-2006-1242, CVE-2006-1343, CVE-2006-1368, CVE-2006-1525
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

linux-image-2.6.10-6-386
linux-image-2.6.10-6-686
linux-image-2.6.10-6-686-smp
linux-image-2.6.10-6-amd64-generic
linux-image-2.6.10-6-amd64-k8
linux-image-2.6.10-6-amd64-k8-smp
linux-image-2.6.10-6-amd64-xeon
linux-image-2.6.10-6-itanium
linux-image-2.6.10-6-itanium-smp
linux-image-2.6.10-6-k7
linux-image-2.6.10-6-k7-smp
linux-image-2.6.10-6-mckinley
linux-image-2.6.10-6-mckinley-smp
linux-image-2.6.10-6-power3
linux-image-2.6.10-6-power3-smp
linux-image-2.6.10-6-power4
linux-image-2.6.10-6-power4-smp
linux-image-2.6.10-6-powerpc
linux-image-2.6.10-6-powerpc-smp
linux-image-2.6.12-10-386
linux-image-2.6.12-10-686
linux-image-2.6.12-10-686-smp
linux-image-2.6.12-10-amd64-generic
linux-image-2.6.12-10-amd64-k8
linux-image-2.6.12-10-amd64-k8-smp
linux-image-2.6.12-10-amd64-xeon
linux-image-2.6.12-10-hppa32
linux-image-2.6.12-10-hppa32-smp
linux-image-2.6.12-10-hppa64
linux-image-2.6.12-10-hppa64-smp
linux-image-2.6.12-10-iseries-smp
linux-image-2.6.12-10-itanium
linux-image-2.6.12-10-itanium-smp
linux-image-2.6.12-10-k7
linux-image-2.6.12-10-k7-smp
linux-image-2.6.12-10-mckinley
linux-image-2.6.12-10-mckinley-smp
linux-image-2.6.12-10-powerpc
linux-image-2.6.12-10-powerpc-smp
linux-image-2.6.12-10-powerpc64-smp
linux-patch-ubuntu-2.6.10
linux-patch-ubuntu-2.6.12

The problem can be corrected by upgrading the affected package to
version 2.6.10-34.17 (for Ubuntu 5.04) or 2.6.12-10.32 (for Ubuntu
5.10).  After a standard system upgrade you need to reboot your
computer to effect the necessary changes.

Details follow:

The sys_mbind() function did not properly verify the validity of the
'maxnod' argument. A local user could exploit this to trigger a buffer
overflow, which caused a kernel crash. (CVE-2006-0557)

The SELinux module did not correctly handle the tracer SID when a
process was already being traced. A local attacker could exploit this
to cause a kernel crash. (CVE-2006-1052)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

John Blackwood discovered a race condition with single-step debugging
multiple processes at the same time. A local attacker could exploit
this to crash the system. This only affects the amd64 platform.
(CVE-2006-1066)

Marco Ivaldi discovered a flaw in the handling of the ID number of IP
packets. This number was incremented after receiving unsolicited TCP
SYN-ACK packets. A remote attacker could exploit this to conduct port
scans with the 'Idle scan' method (nmap -sI), which bypassed intended
port scan protections. (CVE-2006-1242)

Pavel Kankovsky discovered that the getsockopt() function, when called
with an SO_ORIGINAL_DST argument, does not properly clear the returned
structure, so that a random piece of kernel memory is exposed to the
user. This could potentially reveal sensitive data like passwords or
encryption keys. (CVE-2006-1343)

A buffer overflow was discovered in the USB Gadget RNDIS
implementation. While creating a reply message, the driver did not
allocate enough memory for the reply structure. A remote attacker
could exploit this to cause a kernel crash. (CVE-2006-1368)

Alexandra Kossovsky discovered an invalid memory access in the
ip_route_input() function. By using the 'ip' command in a particular
way to retrieve multicast routes, a local attacker could exploit this
to crash the kernel. (CVE-2006-1525)


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.17.diff.gz
      Size/MD5:  6119188 5d24ad7432f286cf30bba4ed47ffde41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.17.dsc
      Size/MD5:     2511 6bf5107129d9c2b80b4fc5cd2f61eb41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.17_all.deb
      Size/MD5:  6777762 e930255ff3a9a36f4d02ef9291addd69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.17_all.deb
      Size/MD5: 37516664 3c13034a12e30dc34c0f20054dd4ba01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.17_all.deb
      Size/MD5:   505748 b65c71096d3b35745e9eb42bb9bbcc33

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    20834 5b18b2a14dee825d5509985f681c8926
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    47402 a0d2cd86d82bf80975df26d3aeefb13f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    88896 882609fe601f9022aceffe9e0b49e171
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    30020 fa23643a9ebd551bcfdd30dfd72111df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    41250 d9f148d8b9551e749ca45fb81e3ae41d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    73602 218b54beab0fa43a0a3049b02b3ee55b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     5744 69fb2f1c9c28b390dc12cfcb18e9cde4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    34858 773ba5bd3561fa3fe479512916109387
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    55184 54a70523827f85efa682575f76389af8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   112954 d7c23a2af2234f7fbbcd0d5f29a85a7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    40822 0b914ac267c233bcea1c9f6594824ac2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   115722 bff2a6131f3ad9fc50c9793e0adbc623
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   174636 84c510f9d87ae279c36a3e281c60a532
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    82586 8c2b6a31b1c97cf46c8990782460c050
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:  1467686 e1839a06cb8b4aee99d4d8541a8ef2cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-generic_2.6.10-34.17_amd64.deb
      Size/MD5:   287286 255df4b30927f1d654c708003bdf70a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8-smp_2.6.10-34.17_amd64.deb
      Size/MD5:   284238 9ba4f125a216753384773213669d739d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8_2.6.10-34.17_amd64.deb
      Size/MD5:   286214 74e9e962dc3cea13e3d3aaf213c0397a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-xeon_2.6.10-34.17_amd64.deb
      Size/MD5:   281712 cd9bb115f8351d8b7cb4ea7ad3c7cf76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.17_amd64.deb
      Size/MD5:  6138588 e663993a2f55fc15b6dc1c859c35d2ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-generic_2.6.10-34.17_amd64.deb
      Size/MD5: 14579542 acae125833fc56bb768588edf6e1fb6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8-smp_2.6.10-34.17_amd64.deb
      Size/MD5: 15123102 7104ed953377decf29824f098155f315
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8_2.6.10-34.17_amd64.deb
      Size/MD5: 15091784 ef00bcccad9ea92085669a849e0b2189
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-xeon_2.6.10-34.17_amd64.deb
      Size/MD5: 14963272 7b2cac4cbed83f604eea590796afc0b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.17_amd64.deb
      Size/MD5:  1361754 9ccab2926d030108a7674f3d0b2c147c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    14222 dd41ce4690d0344a279c4f5ab771dc23
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   178510 4a0bddd6f098dd3f55bf5b6d7bfc3e3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   174894 153af82a009c0eb6c0ca27db75b2b527
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   731210 de0d58ec6d6115a486c05ec384b97969
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   780902 14c98539fe16709a51a1de8d1b0f9007
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   150054 b7924927667920b95b82a4e892507c61
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   168120 a928eb0f7d61c1093065f45c1e2a0b33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     9558 52f6e6ea6f89e58cadf8736b33e66989
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    94860 918a28b5dcc9c17c05912c7b82ebe4fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    45728 ad83d6612150e82d5e32c7d40edce9c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    33162 275e69495b64afd9a198126089fe7c3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    55290 bc2e4fe6d0e0edd982d7330fa6714b0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     4662 491f0f4010fd14fe3b696a92cf268a30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     7838 b64af47cfe6ee6db67389fd77bf7a66d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    53808 5a6d49560e6ff8bf17b2a78926979e7b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   111110 8683b2c2a067b334e6d80dfd4135eebc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    10152 b501b2928b8bba1bc11c3c8c173db946
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    60466 26760ef3d305ea3697b4f872bf505d15
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   208568 97cb43a447112139699ec552af88ae73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    69268 18285324ae965b571455e0663300447d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   394812 b93a3876c0c2a01b07555a3b4d497226
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   294496 b5b2ba47ca6c0b5f4cc1c847c0c31623
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    12070 3e405b634e824a86309cfbe96f8dacbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    22658 d60857cb2ebca5bfa2b1b94940aae5b8
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    28802 f4354992e2dd8cdda902424d8acec899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    56792 c11406512b24c95a073d07012b130f26
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    34938 fd1957702f09517fb5141ae29af47129
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   247472 8a13a5da5132ac37f805c5fc10d9bd26

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    18172 1efe24235cdebbd29cbed9089bd007dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    44826 bf44543b5b443b65c012b67f4b879cad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   103060 fe39319ea2412c7a1dfc410970baa761
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    86018 8a623cf608b18c080016b6bdd9621b49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    29090 83af3323810e99ffe231b9d3b8bde3ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    39774 6e5250232caaa689e2e0e2115f84efe5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    71168 b3b21a750c6d83ef80e48ea6b7f94373
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     5504 c4bcc75585f88f2e87eb054bdebfe710
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    31584 0e80a15801f2986ab51eea41cb2ed3ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    52940 4adaebcd58503a06d8c228412d926e30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   104470 5a3d6af98939720684968f35ea423a97
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    38630 228fa036d82b3d30abb9377513652f89
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   114520 2274e9db1e5d30729b93bede84c14225
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   190632 7ac4363855022dcac8e319b140859ca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    86546 556e336b500c862d4a3dfcbfdd33592e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:  1390040 27df47a9c31a11bb27fbae7d231279d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-386_2.6.10-34.17_i386.deb
      Size/MD5:   315848 35bef7a21ef0fa1ad34a5a25997d2fbb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686-smp_2.6.10-34.17_i386.deb
      Size/MD5:   311496 1f7f54442c02acaab368f2335c615208
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686_2.6.10-34.17_i386.deb
      Size/MD5:   313926 e90150cd095766dbd8bca5bb403dee80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7-smp_2.6.10-34.17_i386.deb
      Size/MD5:   311966 01ce05397e9a8adcf916d5c540fe74dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7_2.6.10-34.17_i386.deb
      Size/MD5:   314146 0e0da52fecbb1b1aaadb0a06285063c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.17_i386.deb
      Size/MD5:  6135472 a207ba5e0330b823b50b77f26cb1896c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-386_2.6.10-34.17_i386.deb
      Size/MD5: 15613184 05d2c3ff3d7938115c9a86b47e96b7d4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686-smp_2.6.10-34.17_i386.deb
      Size/MD5: 16191470 df26b98b3ea1549ae35a0a8f80103aaa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686_2.6.10-34.17_i386.deb
      Size/MD5: 16608578 8f1669a6a4251386078aeebb6371aa85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7-smp_2.6.10-34.17_i386.deb
      Size/MD5: 16302938 e558b74fa53ea05bf009bd81089ccbbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7_2.6.10-34.17_i386.deb
      Size/MD5: 16672646 136da5f5b2e11eef25ab19088d3c2c80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.17_i386.deb
      Size/MD5:  1361606 b4ea92c5afb990ea15f250a47768e182
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    14078 3da8c4375be7ad83e03576169bf0a8b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   183206 68e0ebe51391326389abe2625593d152
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   172778 0f9ec085ff74d9988683420c8a0e1d80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   967874 f5140974f1dfffcbc3b5ee673705d5a6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   780692 752501902783e1b5ca300e29aecdf40b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   140658 8242eeb7856dfc3b6011579c6c4029ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   167944 710db8c73988b84a29a071e1534b1234
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     9346 316a65f4c73d99aa545d629c76ad8818
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    89326 92aef7e00bc1e73ffaa7967052f77a52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    48136 a442a715bd877836bcd75f04d95a1f7c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    30888 5fe6b9dc306c6fdc1969359431d96b55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    65898 f4361c3bba7cd804030918e2a5a71028
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     4508 44801760087bdb0fe7c4cf0184982cc7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     7752 591ed96a68aa4179a9c102c9959abe5a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    50772 beafe9ecc552d4490e11e5877e465caa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   111590 6539c43357bb9d57a08041ea846b36b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     9890 8e4548f453f5f61480ddd32b07a0ae02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    57150 b88ab321f5d8ba1f0f285ad3c51727d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   242022 d6bd5464f9e0f38ff47ad5922b15ab32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    66238 084743b6a460f656922aeb8227a8b7ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   436602 6eaba7837ac10eadd63ff56af4c557c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   485668 71cd27411c9701a7224d8065ac631880
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    11476 c58eba7c421b06363011a2f5d07d9abc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    21246 ecba8bd3bb14a9808ccc0127736953a7
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    29530 fcefac26b8b8c504f0e2216b39f9a237
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   106274 cb66f1386c6863bc2322cdaebc778bc9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    33824 c38a2cf8d306838a9e24a326dfd35405
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   261336 a795fb501d1bd255d80111df26edd1cd

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    24062 5ca002af900f77c15c6cdcf107380417
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    24058 47b70dad2a47caf215f45e3662616a0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    24048 fb87b9e1916b46dedc0d6438e64e591f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    58282 517dd642e1f14a078a0c3658068792a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    58288 fa7c0cf233c9b010973cd82f4423f792
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    58264 16e4aa93b6945418501a1c6cd7689fc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30292 8bd77fd7d4089d86ea26fd747bad75d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30290 2439693c3b4d57cc12cd75656e438b0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30268 9f9203bb1e8b9015d9f45992ef68f022
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   109252 d8a86f6c3bf52b1319336321fe49170f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   109250 d761b45c66f90a5931fd13ef450c6c31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   109228 8604861f017f3e1ede83f30f70abed5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35388 9df7c0b1eb7dd24135908d78b23ee172
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35396 bdb9342e3906988e85df906b58d889ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35382 342f25ab0fe66d84674c9b14abea47a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30936 e25e45df35cbb2e9f96677cb9926e936
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30936 cf6a027b3d0a1c3d9403160463a9e4e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30906 1380fb8e79767fb47b86db8917c4de7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   212970 c649b1e264818fd406667639f378c9e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   212952 eb2379db2dcd7f0a7daca79addafeb3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   212932 7261a14246d8245610a57beeb5b690d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     6170 3c410f2077da26ad3f9a317a69afe234
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     6170 31e84686c6052acb998acb3cadff4c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     6156 81f3906b61d167b0c3c378675d6b66bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    43436 9042696bf6d6e35b1af2af32fe95556b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    43422 a79e72218f997905499ac71a4ed47145
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    43416 edbf43b14f4979a9fa9e588543382684
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     4584 3e72bd08c7ec62eb41d7f5b080b5b0ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     4590 05851f70d4cad42546fa452c2167765d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     4588 6280c46413c92d50a0228804b41dc6b9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66048 34ed32d4ba30c5501138d5b675750abe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66038 59e8f1538dfb4f133595e339663592d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66032 7b188dd6f1c79dcfd836c9b19bb3a3e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   117114 af8a9ed28cc301ab1a0812983cd88178
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   117108 6d91fbbd2e6bc6bff62c7a4475c4f41a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   116856 b46c6d49fad11f05461b0b2752ffb1db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66650 78fc85ce37f8028857a6c2c3b18ac591
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66648 40fb254035d301a4250c9d4f138890e3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66632 e57835c7f5efdb26ecd887057f3cb51a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   142050 4ce4c19bc4797b343b8ca0ed56713df8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   142052 da3bb26c089dadee6c1f68392ae74928
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   142050 3e298fa292812ec514b05843b8f49ca7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213984 33784a06890d04b06cecac3b6bee7344
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213996 4711f2846fb3fe94b1f462cd52c11d30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213948 a145b7af56d4720a3b43638d4dd64137
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   107008 929122127c0f943db0c0566252b7ba13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   107004 35025460601b1cc08f3a27e922c6b029
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   107008 2f994926592545893a9cd38e50d7677d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:  1866712 8aeb5ea169e6498f73c60c431bdf5be2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:  1871106 3d195efbfaadf7284644ddc93c1b1307
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:  1901484 a078755151eb846290ba2fa368e01883
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3-smp_2.6.10-34.17_powerpc.deb
      Size/MD5:   251118 ceeadf1d0353c53a989cf299b29ff7ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3_2.6.10-34.17_powerpc.deb
      Size/MD5:   250598 a7d85ea78247fe5923f6070073efb371
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4-smp_2.6.10-34.17_powerpc.deb
      Size/MD5:   250836 fab084ca1c6c181f4c678e83d555fe49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4_2.6.10-34.17_powerpc.deb
      Size/MD5:   250350 f757388d87fe1782faf45eb56bab26f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc-smp_2.6.10-34.17_powerpc.deb
      Size/MD5:   251330 3b30005aaf6fdc06fe93fcc9655d894a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc_2.6.10-34.17_powerpc.deb
      Size/MD5:   252018 b383c5848968e0d4a4fb404242eee89c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.17_powerpc.deb
      Size/MD5:  6156700 418112ca048915fc05c9e7362d14653f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3-smp_2.6.10-34.17_powerpc.deb
      Size/MD5: 15647116 7dfa4a5a4547ece2036a2506bab1f67c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3_2.6.10-34.17_powerpc.deb
      Size/MD5: 15210074 e79f07b65fc1aeafdc3ffd3af4e6c21c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4-smp_2.6.10-34.17_powerpc.deb
      Size/MD5: 15635114 dedd641b0e3642732c8ca9c5ae55fb33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4_2.6.10-34.17_powerpc.deb
      Size/MD5: 15204542 d6a78a9452f7b6dbf6d64af66240d755
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc-smp_2.6.10-34.17_powerpc.deb
      Size/MD5: 15552194 d40235d5797935e05bf7418af297ce9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc_2.6.10-34.17_powerpc.deb
      Size/MD5: 15245150 111d3df321b02a1413f04344e250b916
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.17_powerpc.deb
      Size/MD5:  1361404 421257489f6cd83556bdfc046788234f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    17360 e3bbd20cb9459cd3bd25d0ba23ac5204
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    17356 c4872e5b5b15eb511b2f3f1ee82589b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    17350 65d3da1238892b0f4e559dd29067c554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213720 6ef31d873bd8e8197c60cbf0eaa6475b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213732 d27624bec1181f7b07c4662143aa1ab6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213448 fa86ff7233428f3a0d5ff59b3ba8b6e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   210744 2fa78c019366b5f7ebd8bf125638cc21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   210748 062fbbabde3f38e1d282dba4b8caa64c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   210728 fa42ea4771999774d929335eeca3ab5d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   688494 9be163087fe91ab5f022a91bbaff82f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   688464 6bab41fc809c3390fe70181c94884da2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   687010 4638bcfa2599d4fc8538dbd5c77083ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   780764 9900799b4a97ecd655f60b673a19e3cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   780750 15dda67190816547d574343e04174f1d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   780778 04279f1e7c5ed32bff4fc991f372fed2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511286 accbde7bede5f307da34c9bcb0d9fa40
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511270 ccfcf14c73070c7dd90ea26100f53962
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   510932 a18ab9c51138440c6e66a85740435fd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   257750 38d5746e3f89cee42347d78d07429d8a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   257762 225e9c23653c3153d428025292e05279
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   256882 0bf7e249e7efa4e81a2c6ce74ea046bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    84426 f5e27cdd2b65e76c3ff3d25c18d8ca46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    84434 c1a5c6b54312f3c78359b03fa2053841
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    84414 b0f068242bb9e7bcf28f7d5d28a1a8de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    60988 e3ed99bcde5495f1dcb1e23ebd4cecc6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    60994 16dbba2a1557416f68254aacdc7fc062
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    60994 d5e875db8be1f9dc3c1371f449df2bed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    65014 138e2104e9d6718cdae3435bdb6dace3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    64996 d3a65bc43b6ad081c98f5a024ef6705c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    64996 e439e88878e2c3ea816ec1e31c9ed7ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     5382 e41a0d60e63f3154075eb851533bae06
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     5378 9839d9d6e2f78e0df4c8ddb32b0e3ffd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     5372 d0377e57c076077a67233f259abab556
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63270 c4427275a0bb9821e8971010932a96e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63282 6b8193ffa6b20de66d3285d6177c3e5d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63226 53da1ed9852175997bfc125a0f4d516d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   131656 e2590affaeb7b58b6737304552a2064e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   131656 00dd8fd8b24be7e172b2f00199e71adb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   131668 0f5faa34cbc5db343550cc7616c5a1b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    70992 62dd2b20e0115d78f6d39ace079b74a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    70980 24521450996a14d4f3e9e47d567fd33a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    70972 2fdb59cd683537497fdc08b309c1d467
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   357328 b27495899f720bb58b7bbfb5427576ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   357324 6071a7ba12c3cf2f526cc885278f9e31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   357336 5d11399007f80cddb85f3662f050da5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    80738 bdbed540e11e766c2886d5f518cf4f59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    80736 fae6d64dd5c7355d951232f619e16950
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    80742 6c446d7d8ac3d728441643f069416cb2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511018 d68a045a31de33a3c0887529c0e7f830
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511010 b04d21a5681939d52b2d940c84f2480b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   510800 4a4074b19b5e2653bb47833d2b82df99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   389166 80a0600bbd448ac367f92bd7ed568022
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   389150 105b2d4cc18e37d68f0c9ad52ca04c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   389020 8fda1f55b6f1f49ebe9c3e90094ced0c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63158 7d5551b5ac5de5f5d5671dd5eceeb250
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63156 a3acd6dd5cb3935ce27f9dba801f8187
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63040 90af2a324ab227b1008d86f09546c879
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    23352 6c9701066ba9e8265a5d4c7f4e6c3608
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    23354 548437458562e87cb4356080399f618b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    23114 4711e4b2bedcd42d95283627372b7264
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35384 ce3cb50b5837dfca56b78e8073180052
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35386 20fbd6f9dc3f672bd86c9a3f15ea49d4
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35374 7cc90ba4aeea92346e322f27d610dc70
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   135106 a06d70bedaefee7c15d45f125709cfe7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   135098 ebc9956341e719190bb4f9c1e22b0a9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   135082 bf80f8fdab73c9847df6ddfe1a484360
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    42402 96f7b9f5a73a687fde6178d772834dac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    42394 089bb0804783a69ff88fc3b90d044b92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    42402 c3ef3d019f80d4361b9878ca5f9a7506
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   294760 3fa8968e0283e17fa9edbe98fdc6fa4a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   294760 a65dd2de7f0958f9ad3719b0617a7d11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   294756 e881fddd33a9f2a499b0d135eec9b9b8

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.32.diff.gz
      Size/MD5:  7938989 23805c9f750752b597669dba7066b487
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.32.dsc
      Size/MD5:     2516 47bb056d4913b3416d9114f021d748af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12.orig.tar.gz
      Size/MD5: 47177098 9272115d4005d4e9773a1a6170fd20cd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-doc-2.6.12_2.6.12-10.32_all.deb
      Size/MD5:  4551650 36bebdb12dc8de941a8021f604a1d5d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.32_all.deb
      Size/MD5: 40452074 7afbaef9aeb2413fda62ee265be41c85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-tree-2.6.12_2.6.12-10.32_all.deb
      Size/MD5:   376602 698576da8b0199eaebdedfe964eddc50

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    20804 6450e663d533cfeeadaabf04b6db510d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    45608 6ef82a44a80bd71b3235a86a29b8605a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     2318 e4952b056356685c2881b041bcc9268a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    88700 6d84cecef9f6eecd5b6b128dcec29ee2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    35156 4cef991c1dded478d7f9219d1cabdd46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    42374 11b914bb0fb4753bf2a8102e7332e512
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    70522 8a855b203da30ec41ed4d26ccecd3f0b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     5742 95ef6282ef4436b7605a5c097941f643
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    34330 189c7e07477f1f469e8f710825354cae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    53480 dbe18c020721243a3bcca668c360cd21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   129586 9af2c32e3cb59d3f249a4b7c29292231
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    43842 d0fe92cefc8f0bf24a8265e4629787ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   115020 bca994a5f41b45bc15f8c9956b0c8814
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   253682 8ccd4ee726f596dafd048427144b1c85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    83362 31c0324f9d8d6f3878f45809abce8fea
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1497830 baf438ff2c43d3673a46d6bf7f7e0a23
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-generic_2.6.12-10.32_amd64.deb
      Size/MD5:   804402 a331cfa4254a013d8f398b43e191b7e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8-smp_2.6.12-10.32_amd64.deb
      Size/MD5:   802436 b4c50f9f6dbf6a45e10750f7fcf14fca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8_2.6.12-10.32_amd64.deb
      Size/MD5:   803422 f1901081b75fa62619c290b5e96c6e09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-xeon_2.6.12-10.32_amd64.deb
      Size/MD5:   799580 4fc8da4aa88dd4e9b3ee7555b52c0e39
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.32_amd64.deb
      Size/MD5:  5917118 72ed7852e6ce056500b6f268277e3da7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-generic_2.6.12-10.32_amd64.deb
      Size/MD5: 17088096 9811f318cf424ac8c45d97e5f675f73f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8-smp_2.6.12-10.32_amd64.deb
      Size/MD5: 18132072 d448c9ffb34b00cd60a842b4f4639366
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8_2.6.12-10.32_amd64.deb
      Size/MD5: 17953170 f8e5701d039aeffaf89194e23f8ba205
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-xeon_2.6.12-10.32_amd64.deb
      Size/MD5: 17898510 b027f3ba22ed9d7a67dedfd1e0224149
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.32_amd64.deb
      Size/MD5:  3488116 4338e1d86d5a7fb785d0406421d2ba3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    14296 a1b364bc6d46efd19aa60236ce99fd9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   191796 bac05d8c1f37b11861e0428857f22f0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   170364 60e70f4b6d12420ebe4b7bd077ff9364
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1048482 a5ed3bb0f2837cc872e125086270eabc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1147242 b22c1070285e8cdb7fbb01b03268be84
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   122454 9224e06ce51520666d18acdbdb90e529
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     8544 c2a232505700015762a1d2606d8178f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    99028 3a081d34ff3a3e10ed426501eaba328a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    44950 d473d502dc3ae3ad5439a8f0b3fd98e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    31652 02abb3c22728344c09a289eeda4262f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    65700 bec821e32c424e447a96e0848191b9af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     4476 68498d34fc12bd0d998f49931102564f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     7880 fd761ffd8fad3e1665d9550928667d96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    53862 4b4d83d2b64a4a1aea473ae40315018c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   107330 ef01943f55c621d14a09936ba4f931f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     9884 03787387778b092b24270be12c0ca745
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    69766 316920367ced519a815d2a7774466fa3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    73056 e1ee27ada2256a7f198c079902d7509e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1271020 537e17b547c6cc9e2f9995d5046c017e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    58394 e99cb673ee7d55a3b3bf172180098657
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    22208 9a4216b4773985029cf7a9043841786e
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    29358 026acdf308ae0f006522cdf69dd5ba14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    62186 0fd5a02af49cff1942475ed7f0066286
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    34966 9a381407c7f1c1f8448fa86b2a8d347f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   248878 68990778c4c1db458e1c3d8944cdc178

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    18676 2e72a51c70d38a761d20e6e824885a55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    43950 66bf118ccc035fbd05a159640e9ac97b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    96884 9bac478e95c49bd294e47c37f9e891c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     2280 86a8b1d6593a79def3a5350dcc089cd4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    83574 09de6f01e2db27fbf0a02def3fba8c73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    33144 b0365f4e3b0701a1a1d296a39f32fee4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    41918 6fee95e9df76e1d5e099e935b52a3dfc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    68230 49a57cb468c3bbd0722f43468e63aebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     5360 d933352d994e7356921cd5a1b7abdc5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    31130 c7a84f8228d65723b601ac8029d6c0fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    51410 71606abdccbd62852107ff6531f56c5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   123396 798be76f90f270bdd302d5d6c94a41cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    42478 0df936ad5c1cd0d45ccffe8fcb814753
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   110270 dafc5eb481d93bf2a498eac6f36b83b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   239816 10a5bf5d58c103cc084d1a33d64b163e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    86174 e0866876938d74b1e8427c2d998e6a24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1417848 749517515374a808fa65acac208b2f7b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-386_2.6.12-10.32_i386.deb
      Size/MD5:   802150 73ec6f592c438cdeca7c842f452ef7c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686-smp_2.6.12-10.32_i386.deb
      Size/MD5:   797500 dd206713958dd2367b66f95548039751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686_2.6.12-10.32_i386.deb
      Size/MD5:   799248 51e29975a302f623568c7d6f046420c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7-smp_2.6.12-10.32_i386.deb
      Size/MD5:   797644 4c08d3208842417c34dbc97c5e46a8df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7_2.6.12-10.32_i386.deb
      Size/MD5:   799836 635c2f89ea565b154e0c2d9dab9f1989
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.32_i386.deb
      Size/MD5:  5926676 7e2b893f996a8108cef752d73c7df97a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-386_2.6.12-10.32_i386.deb
      Size/MD5: 18027126 86905e8ef5251d201a09b7ed2d461bec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686-smp_2.6.12-10.32_i386.deb
      Size/MD5: 19367732 23ad01c0e7b0fd5578a3f5651a2f1282
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686_2.6.12-10.32_i386.deb
      Size/MD5: 19461630 01c2fb17a1e14d55449d63a77aae5024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7-smp_2.6.12-10.32_i386.deb
      Size/MD5: 19501386 093ba38260bca294d5029a1d9187f32c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7_2.6.12-10.32_i386.deb
      Size/MD5: 19545014 5e662d4fae8b3aa7dd29935d72dfc0a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.32_i386.deb
      Size/MD5:  3489778 d94e484d9bff202865c99067419e4e6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    14532 e5cc951093a967eb4a6853e5266a8356
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   194798 b9302c3d2290b7412beaa36445825dcb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   166502 20a3b8b9f199c76e758aaf1dd09887ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1048128 e3959026d4be8ae194db8b2b83e83864
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1341400 4dd130d4a566b7f643b33650ae8781e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   123680 0cfb0520ddd7c05df8208b16e16ebc14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     8240 61a7cd3483de82e5eb991db29aae1029
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    93374 5eaffed9a32f1a0b10e494ab2ac234c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    46818 70a30bb6d18341f3b5669e28a0dbd198
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    29770 15f8ac24e57f1d2d2c042e2ca2157679
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    72278 78fccfa9ee288ed8b05e5c6aa472e83c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     4260 1e708a46d747ccbe5ef225721872ff5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     7664 981b184d0faa71f3b7d53defa103fdff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    50630 a14ff53291111b5433c80836d67384f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   108632 9fb3185346fe1ec523908260e1c69f3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     9806 1f9ca6e75a79ec946e1104e55c1ee1ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    67642 60628ce461391ddee38f266bdfc99497
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    70180 c111d4dd2f65fc2e39906d129cc337d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1481128 c97ee377d12b65a101d9c36ac30bfcb0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    55206 2266ecc681ef65147f29998cfb384236
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    20354 61f1983d39d036faffda5399a8a0b1a7
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    29916 c8fc99af3fa9a7a459ba306ab5947bfa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   111222 06311a3c953cd2d13db22f95d36c4fe9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    34560 1b0ccb7f362f98cd60b0c7892bc5f8a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   263264 f571e25958a863bf226443e50bb4a8ab

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    23364 e43ca2efcb4d199b7bf8d02508a89397
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    26346 b40b92a9572ab373726da6f2b946cace
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    55912 33af725ded6b1b680ab15b9186293d13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    58824 358ee9fb92fe6c278addcf97da6999f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     2312 45dfdd0ee00162889c9e17071b2a45bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     2506 2cc50efc86803d95a073b0958838dc20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    29752 5c35199a12f0f341b00260a32264a808
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    34722 3dad9455aa9ce6307b9c1bde145f6ef0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   104676 a004164ab148162cddb131c2f269871b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   122186 b3c9aaeb784a29a678bf0f005ac842c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    40504 d3ee42f832e62e4618bf6de2e6b2eb37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    45896 42150d82c98896dbac811f17431ba38f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    29002 bb4c49f824a3976d70bac638b44bc3c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    29934 ff235e5457895e0a9ff231468b85b37d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   210094 0039c5fec3a8a5200550c50624887c21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   224770 48d2c4097a953bf27f495bc974dcf1ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     6144 ad95cd01747ae46fb1dac9df410c5f69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     6960 6583c068ad24876a03061d0b4e2c89df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    45170 3a07ad0188304f956197bf4852ce6807
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    40416 415712ed596fb0633fae15c2491eaa15
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     9802 222d1e4d6a01116665ff55c36ff30c9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    11778 c9c1a100b9ed5bad38828d005009ea51
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    76786 05dc1e6b912cf8d7050f1a100a972468
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    85192 04f74fb6e1d7f1fe892b7dba9d6e6d20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   112166 9061da2806cb00e6a6252090477b501f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   129220 84d65169df101de4e69aacaa46ce411a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    76742 ca8320afa7135941a3013d34f9e7e48c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    90406 6dbb327fcd047611c7dce2a5ec1b2d00
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   140758 470e18b3f9419e596c751faf241754b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   157284 a7fc472de134675a2a1a32450ba69ed6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   306084 63ef2a32a7524e50b159e763db24f20d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   210688 c9f497e57d482166c6d8a781bbb7d49c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   110776 50b8e557bc7be3d4073028dbefe88c1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   116648 00ad44a8b575eaccb1671d44d1021c2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1976268 32d6d6c5bd5825b5bdb69b71e3d57730
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  2350318 da80caab964bb8d0faf8901eaedd0125
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-headers-2.6.12-10-iseries-smp_2.6.12-10.32_powerpc.deb
      Size/MD5:   773126 b40189e84d90269d3552b890e18fedb5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc-smp_2.6.12-10.32_powerpc.deb
      Size/MD5:   782140 6ec521574da7f1b2a6829fd229ef5d98
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc64-smp_2.6.12-10.32_powerpc.deb
      Size/MD5:   800474 749d4337368ce487a4fc45e07786b73b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc_2.6.12-10.32_powerpc.deb
      Size/MD5:   782610 78a6b29c43ed70792d755bbf1f3443bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.32_powerpc.deb
      Size/MD5:  5934550 3f438c72413aa10d9525c7e8612ed32a
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-image-2.6.12-10-iseries-smp_2.6.12-10.32_powerpc.deb
      Size/MD5: 19519670 8fb96a42876cabc9254651f42912747b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc-smp_2.6.12-10.32_powerpc.deb
      Size/MD5: 18358530 1bfca927c7e5a023d26ead70ee418a91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc64-smp_2.6.12-10.32_powerpc.deb
      Size/MD5: 21185380 d41da9dc59cb332ae05469fdccc04829
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc_2.6.12-10.32_powerpc.deb
      Size/MD5: 18005522 2f2a25269383a4759a8ca97bc095b1de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.32_powerpc.deb
      Size/MD5:  3490682 0a4877353325cf3ce33389007b209399
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    17622 3be28d73eb78692e68effb6b031ce86c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    17788 bad3724a1489044a1ef67472f975c94c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   234112 1df122def0aedff336a149965a196ebb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   258864 63e7824904eeb909b36c6a5bb2506444
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   208850 60b9f65c296e26c0254cbe305bdeccd6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   235390 9f22a6d50220fed8b7548fd8f6d08d45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1048262 44a8a2f5b2e9db1d9a4ccbd6a4764df0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1048450 0cd2fe5e78e76645acad0ba7ae6cd296
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1458026 82174e0ef9142374b2152cacfa012e19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1622966 7eaca327fc9ed041c438ed3a868fd7e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   212814 da84848f1a000dbe13b86d6ad479c8ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   197956 3f7d128e38223dc10569e598b3b93a86
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     9464 0d4f9a9895a2484a2f31da5f92cb1ba1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     9058 cba9beeec58e1646654369585bb84cd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   115330 004f70f50920b6b3360f38373afd3b37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   134444 cb22e79603779e9e2944670ce23d6f2b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    77024 97fdc809bb45ec888353d0d5703025b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    87528 1e792bf6010443a00b0446ebc000a595
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     4818 eb1f88c2bba42f617e67d3182f3a87e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     5278 a471c77d1889cde8ac22b06a24ab709e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    63048 7dd25326635abfe1b0d1a6e76b457cde
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    75998 885c4b6c0f19d104fd7c0923262947ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   128624 341c03f1004c2d6f2b07e509e275fce2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   164354 ca2065bcb12ed7de81d7ba5929053a49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    77434 99a5f0af4ec2e85e2cd527c81c2eb614
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    98154 7566958e736f651ee1ba50041d3289b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    85246 bc19efedb748034bcfc5cdebbe31bb12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    92320 c977c2d5c007b5131de30c2ed05191e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1537900 bede87230459361c5ddf564ba0e4e8d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1755634 7e584e699dfac8f58b41e2a676b937c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    65292 ac172ce0f3e019a939af8c7ee8abccdc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   100430 9f2cc97cf6c02a60829880809fd55361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    22878 ebc05305ef51f033b2c9d28890027dcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    28602 e4a3ea1a04a3ab871ab6407d3826e370
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    35498 1c171b07d568b36988941d3d4a78fc40
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    39800 ac4d4374884d05838fceb150776b2c49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   139886 e1a01e0d5e3a3c3348f175d715aa8d7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   152640 3f434bd827b9655f4d50ed45116ad6b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    40964 139d003d99faca8276fe32c5466ecd27
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    44420 8e792edbd7bb0a376c818d95aa576c85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   296164 cc1b3c4445b81bf387768e465e93240e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   324184 381ba18b4a9c04ff1f25b9f1119b7e4a
    

- 漏洞信息

24137
Linux Kernel Crafted Zero IP ID DF Packet Countermeasure Bypass
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-03-14 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.6.16.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel IP ID Information Disclosure Weakness
Design Error 17109
Yes No
2006-03-14 12:00:00 2007-01-19 04:50:00
Marco Ivaldi <raptor@0xdeadbeef.info> reported this issue.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
S.u.S.E. UnitedLinux 1.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.16 -rc1
Linux kernel 2.6.15 .6
Linux kernel 2.6.15 .4
Linux kernel 2.6.15 .3
Linux kernel 2.6.15 .2
Linux kernel 2.6.15 .1
Linux kernel 2.6.15 -rc3
Linux kernel 2.6.15 -rc2
Linux kernel 2.6.15 -rc1
Linux kernel 2.6.15
Linux kernel 2.6.14 .5
Linux kernel 2.6.14 .4
Linux kernel 2.6.14 .3
Linux kernel 2.6.14 .2
Linux kernel 2.6.14 .1
Linux kernel 2.6.14 -rc4
Linux kernel 2.6.14 -rc3
Linux kernel 2.6.14 -rc2
Linux kernel 2.6.14 -rc1
Linux kernel 2.6.14
Linux kernel 2.6.13 .4
Linux kernel 2.6.13 .3
Linux kernel 2.6.13 .2
Linux kernel 2.6.13 .1
Linux kernel 2.6.13 -rc7
Linux kernel 2.6.13 -rc6
Linux kernel 2.6.13 -rc4
Linux kernel 2.6.13 -rc1
Linux kernel 2.6.13
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.4.27
Linux kernel 2.6.15.5
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8710 CM 3.1
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8700 CM 3.1
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8500 CM 3.1
Avaya S8500 0
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya S8300 CM 3.1
Avaya S8300 0
Avaya Messaging Storage Server MM3.0
Avaya Converged Communications Server 2.0
Linux kernel 2.6.16 .1
Linux kernel 2.4.32
Linux kernel 2.4.31
Linux kernel 2.4.26

- 不受影响的程序版本

Linux kernel 2.6.16 .1
Linux kernel 2.4.32
Linux kernel 2.4.31
Linux kernel 2.4.26

- 漏洞讨论

The Linux kernel is prone to a remote information-disclosure weakness. This issue is due to an implementation flaw of a zero 'ip_id' information-disclosure countermeasure.

This issue allows remote attackers to use affected computers in stealth network port and trust scans.

The Linux kernel 2.6 series, as well as some kernels in the 2.4 series, are affected by this weakness.

- 漏洞利用

To exploit this issue, an attacker would use common network utilities such as 'nmap', 'hping', and so on.

- 解决方案

Various Linux kernel versions, such as some in the 2.4 series, are not affected by this issue.

The vendor has released version 2.6.16.1 of the Linux kernel to address this issue.

Please see the references for more information and vendor advisories.


Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test10

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站