CVE-2006-1343
CVSS2.1
发布时间 :2006-03-21 13:02:00
修订时间 :2016-10-17 23:39:28
NMCOP    

[原文]net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory.


[CNNVD]Linux Kernel Ssockaddr_In.Sin_Zero Kernel内存泄露漏洞(CNNVD-200603-366)

        Linux Kernel是开放源码操作系统Linux所使用的内核。
        Linux Kernel在执行某些套接字函数时存在漏洞,可能导致泄露内核内存的某些数据。
        Linux Kernel在调用某些套接字函数检索指定的套接字时,没有清零sockaddr_in.sin_zero数组便返回给用户空间程序。攻击者可以以SO_ORIGINAL_DST"选项调用getsockopt()函数,或调用getsockname()、getpeername和accept()函数,泄漏Kernel栈中6个未初始化的字节。
        注意:getsockname()、getpeername()和accept()函数中的漏洞仅影响2.4 kernel。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.4.0Linux Kernel 2.4.0
cpe:/o:linux:linux_kernel:2.6.0Linux Kernel 2.6.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10875net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1343
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-366
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=linux-netdev&m=114148078223594&w=2
(UNKNOWN)  MLIST  [linux-netdev] 20060304 BUG: Small information leak in SO_ORIGINAL_DST (2.4 and 2.6) and
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://www.debian.org/security/2006/dsa-1097
(UNKNOWN)  DEBIAN  DSA-1097
http://www.debian.org/security/2006/dsa-1184
(UNKNOWN)  DEBIAN  DSA-1184
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
(UNKNOWN)  MANDRIVA  MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
(UNKNOWN)  MANDRIVA  MDKSA-2006:150
http://www.redhat.com/support/errata/RHSA-2006-0437.html
(UNKNOWN)  REDHAT  RHSA-2006:0437
http://www.redhat.com/support/errata/RHSA-2006-0575.html
(UNKNOWN)  REDHAT  RHSA-2006:0575
http://www.redhat.com/support/errata/RHSA-2006-0579.html
(UNKNOWN)  REDHAT  RHSA-2006:0579
http://www.redhat.com/support/errata/RHSA-2006-0580.html
(UNKNOWN)  REDHAT  RHSA-2006:0580
http://www.securityfocus.com/archive/1/archive/1/435490/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060531 rPSA-2006-0087-1 kernel
http://www.securityfocus.com/archive/1/archive/1/451404/100/0/threaded
(UNKNOWN)  BUGTRAQ  20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
http://www.securityfocus.com/archive/1/archive/1/451417/100/200/threaded
(UNKNOWN)  BUGTRAQ  20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
http://www.securityfocus.com/archive/1/archive/1/451419/100/200/threaded
(UNKNOWN)  BUGTRAQ  20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
http://www.securityfocus.com/archive/1/archive/1/451426/100/200/threaded
(UNKNOWN)  BUGTRAQ  20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
http://www.securityfocus.com/bid/17203
(UNKNOWN)  BID  17203
http://www.trustix.org/errata/2006/0032/
(UNKNOWN)  TRUSTIX  2006-0032
http://www.ubuntulinux.org/support/documentation/usn/usn-281-1
(UNKNOWN)  UBUNTU  USN-281-1
http://www.vmware.com/download/esx/esx-202-200610-patch.html
(UNKNOWN)  CONFIRM  http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
(UNKNOWN)  CONFIRM  http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
(UNKNOWN)  CONFIRM  http://www.vmware.com/download/esx/esx-254-200610-patch.html
http://www.vupen.com/english/advisories/2006/2071
(UNKNOWN)  VUPEN  ADV-2006-2071
http://www.vupen.com/english/advisories/2006/4502
(UNKNOWN)  VUPEN  ADV-2006-4502
http://xforce.iss.net/xforce/xfdb/25425
(UNKNOWN)  XF  linux-sockaddr-memory-leak(25425)

- 漏洞信息

Linux Kernel Ssockaddr_In.Sin_Zero Kernel内存泄露漏洞
低危 设计错误
2006-03-21 00:00:00 2006-03-23 00:00:00
本地  
        Linux Kernel是开放源码操作系统Linux所使用的内核。
        Linux Kernel在执行某些套接字函数时存在漏洞,可能导致泄露内核内存的某些数据。
        Linux Kernel在调用某些套接字函数检索指定的套接字时,没有清零sockaddr_in.sin_zero数组便返回给用户空间程序。攻击者可以以SO_ORIGINAL_DST"选项调用getsockopt()函数,或调用getsockname()、getpeername和accept()函数,泄漏Kernel栈中6个未初始化的字节。
        注意:getsockname()、getpeername()和accept()函数中的漏洞仅影响2.4 kernel。

- 公告与补丁

        暂无数据

- 漏洞信息 (F52052)

VMware Security Advisory 2006-0008 (PacketStormID:F52052)
2006-11-14 00:00:00
VMware  vmware.com
advisory,vulnerability,python
CVE-2004-2069,CVE-2006-3403,CVE-2005-2177,CVE-2006-3467,CVE-2006-1056,CVE-2006-1342,CVE-2006-1343,CVE-2006-1864,CVE-2006-2071
[点击下载]

VMware Security Advisory - A new update has been released for VMware ESX 2.0.2 versions prior to upgrade patch 2. This patch addresses vulnerabilities in Openssh, samba, Python, ucd-snmp, XFree86, and more.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2006-0008
Synopsis:          VMware ESX Server 2.0.2 Upgrade Patch 2
Patch URL: http://www.vmware.com/download/esx/esx-202-200610-patch.html
Issue date:        2006-10-31
Updated on:        2006-11-13
CVE Names:         CAN-2004-2069 CVE-2006-3403 CVE-2005-2177
                   CVE-2006-3467 CVE-2006-1342 CVE-2006-1343
                   CVE-2006-1864 CVE-2006-2071
- - -------------------------------------------------------------------

1. Summary:

Updated package addresses several security issues.

2. Relevant releases:

VMware ESX 2.0.2 prior to upgrade patch 2

3. Problem description:

This patch addresses the following security issues:

Openssh -- A bug was found in the way the OpenSSH server handled the
MaxStartups and LoginGraceTime configuration variables. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CAN-2004-2069 to this issue.

samba -- A denial of service bug was found in the way the smbd daemon
tracks active connections to shares. It was possible for a remote
attacker to cause the smbd daemon to consume a large amount of system
memory by sending carefully crafted smb requests. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CVE-2006-3403 to this issue.

Python -- An integer overflow flaw was found in Python's PCRE library
that could be triggered by a maliciously crafted regular expression. On
systems that accept arbitrary regular expressions from untrusted users,
this could be exploited to execute arbitrary code with the privileges of
the application using the library. The Common Vulnerabilities and
Exposures project (cve.mitre.org) assigned the name CVE-2005-2491 to
this issue.

ucd-snmp -- A denial of service bug was found in the way ucd-snmp uses
network stream protocols. A remote attacker could send a ucd-snmp agent
a specially crafted packet which will cause the agent to crash. The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CAN-2005-2177 to this issue.

XFree86 -- An integer overflow flaw in the way the XFree86 server
processes PCF font files was discovered. A malicious authorized client
could exploit this issue to cause a denial of service (crash) or
potentially execute arbitrary code with root privileges on the XFree86
server. The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2006-3467 to this issue.

A minor info leak in socket name handling in the network code
(CVE-2006-1342).
A minor info leak in socket option handling in the network code
(CVE-2006-1343).
A directory traversal vulnerability in smbfs that allowed a local user
to escape chroot restrictions for an SMB-mounted filesystem via "..\\"
sequences (CVE-2006-1864).
A flaw in the mprotect system call that allowed to give write permission
to a readonly attachment of shared memory (CVE-2006-2071).

NOTE: AMD processers were not supported in the VMware ESX 2.0.2 release
so CVE-2006-1056 is not applicable to this version of the product.

The non-security-related fixes are documented on the patch download page.

4. Solution:

Upgrade to the latest update package for your release of ESX.
http://www.vmware.com/download/esx/

http://www.vmware.com/download/esx/esx-202-200610-patch.html

he md5 checksum output should match the following:
9e79d333ac9360122fb69bc8fc549405 esx-2.0.2-31924-upgrade.tar.gz

5. References:
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2069
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
http://www.vmware.com/products/esx/
http://www.vmware.com/download/esx/

6. Contact:

http://www.vmware.com/security

VMware Security Response Policy
http://www.vmware.com/vmtn/technology/security/security_response.html

E-mail:  security@vmware.com

Copyright 2006 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFFWP5W6KjQhy2pPmkRCDVzAJ9O3O4zIUSmEW9i4NyvxKxd1xUMLwCfRrYT
PiCazE9ioHCf33AaY31k8mU=
=U+XZ
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F52051)

VMware Security Advisory 2006-0007 (PacketStormID:F52051)
2006-11-14 00:00:00
VMware  vmware.com
advisory,vulnerability,python
CVE-2004-2069,CVE-2006-3403,CVE-2005-2177,CVE-2006-3467,CVE-2006-1056,CVE-2006-1342,CVE-2006-1343,CVE-2006-1864,CVE-2006-2071
[点击下载]

VMware Security Advisory - A new update has been released for VMware ESX 2.1.3 versions prior to upgrade patch 2. This patch addresses vulnerabilities in Openssh, samba, Python, ucd-snmp, XFree86, and more.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2006-0007
Synopsis:          VMware ESX Server 2.1.3 Upgrade Patch 2
Patch URL: http://www.vmware.com/download/esx/esx-213-200610-patch.html
Issue date:        2006-10-31
Updated on:        2006-11-13
CVE Names:         CAN-2004-2069 CVE-2006-3403 CVE-2005-2177
                   CVE-2006-3467 CVE-2006-1056 CVE-2006-1342
                   CVE-2006-1343 CVE-2006-1864 CVE-2006-2071
- - -------------------------------------------------------------------

1. Summary:

Updated package addresses several security issues.

2. Relevant releases:

VMware ESX 2.1.3 prior to upgrade patch 2

3. Problem description:

This patch addresses the following security issues:

Openssh -- A bug was found in the way the OpenSSH server handled the
MaxStartups and LoginGraceTime configuration variables. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CAN-2004-2069 to this issue.

samba -- A denial of service bug was found in the way the smbd daemon
tracks active connections to shares. It was possible for a remote
attacker to cause the smbd daemon to consume a large amount of system
memory by sending carefully crafted smb requests. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CVE-2006-3403 to this issue.

Python -- An integer overflow flaw was found in Python's PCRE library
that could be triggered by a maliciously crafted regular expression. On
systems that accept arbitrary regular expressions from untrusted users,
this could be exploited to execute arbitrary code with the privileges of
the application using the library. The Common Vulnerabilities and
Exposures project (cve.mitre.org) assigned the name CVE-2005-2491 to
this issue.

ucd-snmp -- A denial of service bug was found in the way ucd-snmp uses
network stream protocols. A remote attacker could send a ucd-snmp agent
a specially crafted packet which will cause the agent to crash. The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CAN-2005-2177 to this issue.

XFree86 -- An integer overflow flaw in the way the XFree86 server
processes PCF font files was discovered. A malicious authorized client
could exploit this issue to cause a denial of service (crash) or
potentially execute arbitrary code with root privileges on the XFree86
server. The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2006-3467 to this issue.

An AMD fxsave/restore security vulnerability. The instructions fxsave
and fxrstor on AMD CPUs are used to save or restore the FPU registers
(FOP, FIP and FDP). On AMD Opteron processors, these instructions do not
save/restore some exception related registers unless an exception is
currently being serviced. This could allow a local attacker to partially
monitor the execution path of FPU processes, possibly allowing them to
obtain sensitive information being passed through those processes.  The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2006-1056 to this issue.

A minor info leak in socket name handling in the network code
(CVE-2006-1342).
A minor info leak in socket option handling in the network code
(CVE-2006-1343).
A directory traversal vulnerability in smbfs that allowed a local user
to escape chroot restrictions for an SMB-mounted filesystem via "..\\"
sequences (CVE-2006-1864).
A flaw in the mprotect system call that allowed to give write permission
to a readonly attachment of shared memory (CVE-2006-2071).

The non-security-related fixes are documented on the patch download page.

4. Solution:

Upgrade to the latest update package for your release of ESX.
http://www.vmware.com/download/esx/

http://www.vmware.com/download/esx/esx-213-200610-patch.html

The md5 checksum output should match the following:
c7057896ee275ce28b0b94a2186c1232 esx-2.1.3-24171-upgrade.tar.gz

5. References:
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2069
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
http://www.vmware.com/products/esx/
http://www.vmware.com/download/esx/

6. Contact:

http://www.vmware.com/security

VMware Security Response Policy
http://www.vmware.com/vmtn/technology/security/security_response.html

E-mail:  security@vmware.com

Copyright 2006 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFFWP5M6KjQhy2pPmkRCGbTAJ9a4PnHLWO6HwHQKzVPj1VI9V0dVQCdETxH
ISqiyTar1d433nMH9q/JvxA=
=cesx
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F52050)

VMware Security Advisory 2006-0006 (PacketStormID:F52050)
2006-11-14 00:00:00
VMware  vmware.com
advisory,vulnerability,python
CVE-2004-2069,CVE-2006-3403,CVE-2005-2177,CVE-2006-3467,CVE-2006-1056,CVE-2006-1342,CVE-2006-1343,CVE-2006-1864,CVE-2006-2071
[点击下载]

VMware Security Advisory - A new update has been released for VMware ESX versions 2.5.3 prior to upgrade patch 4. This patch addresses vulnerabilities in Openssh, samba, Python, ucd-snmp, XFree86, and more.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2006-0006
Synopsis:          VMware ESX Server 2.5.3 Upgrade Patch 4
Patch URL: http://www.vmware.com/download/esx/esx-253-200610-patch.html
Issue date:        2006-10-31
Updated on:        2006-11-13
CVE Names:         CAN-2004-2069 CVE-2006-3403 CVE-2005-2177
                   CVE-2006-3467 CVE-2006-1056 CVE-2006-1342
                   CVE-2006-1343 CVE-2006-1864 CVE-2006-2071
- - -------------------------------------------------------------------

1. Summary:

Updated package addresses several security issues.

2. Relevant releases:

VMware ESX 2.5.3 prior to upgrade patch 4

3. Problem description:

This patch addresses the following security issues:

Openssh -- A bug was found in the way the OpenSSH server handled the
MaxStartups and LoginGraceTime configuration variables. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CAN-2004-2069 to this issue.

samba -- A denial of service bug was found in the way the smbd daemon
tracks active connections to shares. It was possible for a remote
attacker to cause the smbd daemon to consume a large amount of system
memory by sending carefully crafted smb requests. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CVE-2006-3403 to this issue.

Python -- An integer overflow flaw was found in Python's PCRE library
that could be triggered by a maliciously crafted regular expression. On
systems that accept arbitrary regular expressions from untrusted users,
this could be exploited to execute arbitrary code with the privileges of
the application using the library. The Common Vulnerabilities and
Exposures project (cve.mitre.org) assigned the name CVE-2005-2491 to
this issue.

ucd-snmp -- A denial of service bug was found in the way ucd-snmp uses
network stream protocols. A remote attacker could send a ucd-snmp agent
a specially crafted packet which will cause the agent to crash. The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CAN-2005-2177 to this issue.

XFree86 -- An integer overflow flaw in the way the XFree86 server
processes PCF font files was discovered. A malicious authorized client
could exploit this issue to cause a denial of service (crash) or
potentially execute arbitrary code with root privileges on the XFree86
server. The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2006-3467 to this issue.

An AMD fxsave/restore security vulnerability. The instructions fxsave
and fxrstor on AMD CPUs are used to save or restore the FPU registers
(FOP, FIP and FDP). On AMD Opteron processors, these instructions do not
save/restore some exception related registers unless an exception is
currently being serviced. This could allow a local attacker to partially
monitor the execution path of FPU processes, possibly allowing them to
obtain sensitive information being passed through those processes.  The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2006-1056 to this issue.

A minor info leak in socket name handling in the network code
(CVE-2006-1342).
A minor info leak in socket option handling in the network code
(CVE-2006-1343).
A directory traversal vulnerability in smbfs that allowed a local user
to escape chroot restrictions for an SMB-mounted filesystem via "..\\"
sequences (CVE-2006-1864).
A flaw in the mprotect system call that allowed to give write permission
to a readonly attachment of shared memory (CVE-2006-2071).

The non-security-related fixes are documented on the patch download page.

4. Solution:

Upgrade to the latest update package for your release of ESX.
http://www.vmware.com/download/esx/

http://www.vmware.com/download/esx/esx-253-200610-patch.html

The md5 checksum output should match the following:
4852f5a00e29b5780d9d0fadc0d28f3e esx-2.5.3-32134-upgrade.tar.gz

Please DO NOT apply this patch on SunFire X4100 or X4200 servers.
For further details, please refer to knowledge base article 2085:
Installing ESX 2.5.3 on SunFire x4100 and x4200 Servers.
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2085

5. References:
http://www.vmware.com/download/esx/esx-253-200610-patch.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2069
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
http://www.vmware.com/products/esx/
http://www.vmware.com/download/esx/

6. Contact:

http://www.vmware.com/security

VMware Security Response Policy
http://www.vmware.com/vmtn/technology/security/security_response.html

E-mail:  security@vmware.com

Copyright 2006 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFFWP476KjQhy2pPmkRCD9rAKC9xQ9ej+t23opBsZn5BY6w736lmQCfQ9WA
5PuJxKgAYF2RTeQoXM7lr1I=
=miw3
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F52049)

VMware Security Advisory 2006-0005 (PacketStormID:F52049)
2006-11-14 00:00:00
VMware  vmware.com
advisory,vulnerability
CVE-2005-2177,CVE-2006-3467,CVE-2006-1056,CVE-2006-1342,CVE-2006-1343,CVE-2006-1864,CVE-2006-2071
[点击下载]

VMware Security Advisory - A new update has been released for VMware ESX versions 2.5.4 prior to upgrade patch 1. This patch addresses vulnerabilities in ucd-snmp, XFree86, an AMD fxsave/restore security flaw, some minor information leaks, and more.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2006-0005
Synopsis:          VMware ESX Server 2.5.4 Upgrade Patch 1
Patch URL: http://www.vmware.com/download/esx/esx-254-200610-patch.html
Issue date:        2006-10-31
Updated on:        2006-11-13
CVE Names:         CVE-2005-2177 CVE-2006-3467 CVE-2006-1056
                   CVE-2006-1342 CVE-2006-1343 CVE-2006-1864
                   CVE-2006-2071
- - -------------------------------------------------------------------

1. Summary:

Updated package addresses several security issues.

2. Relevant releases:

VMware ESX 2.5.4 prior to upgrade patch 1

3. Problem description:

This patch addresses the following security issues:

ucd-snmp -- A denial of service bug was found in the way ucd-snmp uses
network stream protocols. A remote attacker could send a ucd-snmp agent
a specially crafted packet which will cause the agent to crash. The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CAN-2005-2177 to this issue.

XFree86 -- An integer overflow flaw in the way the XFree86 server
processes PCF font files was discovered. A malicious authorized client
could exploit this issue to cause a denial of service (crash) or
potentially execute arbitrary code with root privileges on the XFree86
server. The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2006-3467 to this issue.

An AMD fxsave/restore security vulnerability. The instructions fxsave
and fxrstor on AMD CPUs are used to save or restore the FPU registers
(FOP, FIP and FDP). On AMD Opteron processors, these instructions do not
save/restore some exception related registers unless an exception is
currently being serviced. This could allow a local attacker to partially
monitor the execution path of FPU processes, possibly allowing them to
obtain sensitive information being passed through those processes.  The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2006-1056 to this issue.

A minor info leak in socket name handling in the network code
(CVE-2006-1342).
A minor info leak in socket option handling in the network code
(CVE-2006-1343).
A directory traversal vulnerability in smbfs that allowed a local user
to escape chroot restrictions for an SMB-mounted filesystem via "..\\"
sequences (CVE-2006-1864).
A flaw in the mprotect system call that allowed to give write permission
to a readonly attachment of shared memory (CVE-2006-2071).

The non-security-related fixes are documented on the patch download page.

4. Solution:

Upgrade to the latest update package for your release of ESX.
http://www.vmware.com/download/esx/

http://www.vmware.com/download/esx/esx-254-200610-patch.html

The md5 checksum output should match the following:
6bc66a5cdbfea08f762f375f2488998b esx-2.5.4-32461-upgrade.tar.gz

5. References:
http://www.vmware.com/download/esx/esx-254-200610-patch.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
http://www.vmware.com/products/esx/
http://www.vmware.com/download/esx/

6. Contact:

http://www.vmware.com/security

VMware Security Response Policy
http://www.vmware.com/vmtn/technology/security/security_response.html

E-mail:  security@vmware.com

Copyright 2006 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFFWP4q6KjQhy2pPmkRCJLcAKC8hclWfRdKXjT8RfYEsLykp1lcOQCfZvve
Wm8ulAa7VayW5kYj/a75mcg=
=rbyq
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F49474)

Mandriva Linux Security Advisory 2006.150 (PacketStormID:F49474)
2006-08-28 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2006-0554,CVE-2006-0744,CVE-2006-1343,CVE-2006-1857,CVE-2006-1858,CVE-2006-1863,CVE-2006-1864,CVE-2006-2274,CVE-2006-2935,CVE-2006-2936,CVE-2006-3468,CVE-2006-3745
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-150 - A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:150
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : August 25, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to 2.6.15.5, the kerenl allowed local users to obtain sensitive
 information via a crafted XFS ftruncate call (CVE-2006-0554).
 
 Prior to 2.6.15.5, the kernel did not properly handle uncanonical
 return addresses on Intel EM64T CPUs causing the kernel exception
 handler to run on the user stack with the wrong GS (CVE-2006-0744).
 
 ip_conntrack_core.c in the 2.6 kernel, and possibly
 nf_conntrack_l3proto_ipv4.c did not clear sockaddr_in.sin_zero before
 returning IPv4 socket names from the getsockopt function with
 SO_ORIGINAL_DST, which could allow local users to obtain portions of
 potentially sensitive memory (CVE-2006-1343).
 
 Prior to 2.6.16.17, the a buffer overflow in SCTP in the kernel allowed
 remote attackers to cause a Denial of Service (crash) and possibly
 execute arbitrary code via a malformed HB-ACK chunk (CVE-2006-1857).
 
 Prior to 2.6.16.17, SCTP in the kernel allowed remote attackers to
 cause a DoS (crash) and possibly execute arbitrary code via a chunk
 length that is inconsistent with the actual length of provided
 parameters (CVE-2006-1858).
 
 Prior to 2.6.16, a directory traversal vulnerability in CIFS could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1863).
 
 Prior to 2.6.16, a directory traversal vulnerability in smbfs could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1864).
 
 Prior to 2.6.17, Linux SCTP allowed a remote attacker to cause a DoS
 (infinite recursion and crash) via a packet that contains two or more
 DATA fragments, which caused an skb pointer to refer back to itself
 when the full message is reassembled, leading to an infinite recursion
 in the sctp_skb_pull function (CVE-2006-2274).
 
 The dvd_read_bca function in the DVD handling code assigns the wrong
 value to a length variable, which could allow local users to execute
 arbitrary code via a crafted USB storage device that triggers a buffer
 overflow (CVE-2006-2935).
 
 Prior to 2.6.17, the ftdi_sio driver could allow local users to cause
 a DoS (memory consumption) by writing more data to the serial port than
 the hardware can handle, causing the data to be queued (CVE-2006-2936).
 
 The 2.6 kernel, when using both NFS and EXT3, allowed remote attackers
 to cause a DoS (file system panic) via a crafted UDP packet with a V2
 lookup procedure that specifies a bad file handle (inode number),
 triggering an error and causing an exported directory to be remounted
 read-only (CVE-2006-3468).
 
 The 2.6 kernel's SCTP was found to cause system crashes and allow for
 the possibility of local privilege escalation due to a bug in the
 get_user_iov_size() function that doesn't properly handle overflow when
 calculating the length of iovec (CVE-2006-3745).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0554
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1863
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2274
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3468
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 9d14c43145beafb4e63fe8cae758d0f6  corporate/3.0/RPMS/kernel-2.6.3.35mdk-1-1mdk.i586.rpm
 e7331f51ed5cf4edee33efcb01f49243  corporate/3.0/RPMS/kernel-BOOT-2.6.3.35mdk-1-1mdk.i586.rpm
 dcb027450192d7d73f407f30d3e3e852  corporate/3.0/RPMS/kernel-enterprise-2.6.3.35mdk-1-1mdk.i586.rpm
 59f29ace5cc862c84cace5d046d6302e  corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.35mdk-1-1mdk.i586.rpm
 6b062c5059587a927f31fea04fb91a3a  corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.35mdk-1-1mdk.i586.rpm
 744287198a20913bd38b1c1d37a68bd2  corporate/3.0/RPMS/kernel-secure-2.6.3.35mdk-1-1mdk.i586.rpm
 17780ad90f4989615baab5f115074f8a  corporate/3.0/RPMS/kernel-smp-2.6.3.35mdk-1-1mdk.i586.rpm
 4555bac09b7ce50d83b97c47af0b2724  corporate/3.0/RPMS/kernel-source-2.6.3-35mdk.i586.rpm
 7165754462cdfcd92c894f56623bc8b0  corporate/3.0/RPMS/kernel-source-stripped-2.6.3-35mdk.i586.rpm
 e59db387f0642f5293dc60283832557b  corporate/3.0/SRPMS/kernel-2.6.3.35mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 918a70fe836d900b217f442b5208c779  x86_64/corporate/3.0/RPMS/kernel-2.6.3.35mdk-1-1mdk.x86_64.rpm
 dd1ea77b15bd07c75f5ab7caf00dbde0  x86_64/corporate/3.0/RPMS/kernel-BOOT-2.6.3.35mdk-1-1mdk.x86_64.rpm
 c8964849f4142c2c51c3ddd298513753  x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.35mdk-1-1mdk.x86_64.rpm
 7a98664c4ba5f0d50a500c1158a8fb08  x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.35mdk-1-1mdk.x86_64.rpm
 3c4d5ca4f7a1a91d99fc182e499c9e76  x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-35mdk.x86_64.rpm
 a25c6705ba2b70c85c1c86e68cb0d3cd  x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-35mdk.x86_64.rpm
 e59db387f0642f5293dc60283832557b  x86_64/corporate/3.0/SRPMS/kernel-2.6.3.35mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 5cab4be7c19a67689f33f01de208879e  mnf/2.0/RPMS/kernel-2.6.3.35mdk-1-1mdk.i586.rpm
 ee1db88c9010b3a1af0f5ea93ce86505  mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.35mdk-1-1mdk.i586.rpm
 0e3618eec1dcb5bca817ecec7e912836  mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.35mdk-1-1mdk.i586.rpm
 ded09245567203340c86b3ddacf21b3a  mnf/2.0/RPMS/kernel-secure-2.6.3.35mdk-1-1mdk.i586.rpm
 7efdc84f2748f1c2237a72ef94d90b31  mnf/2.0/RPMS/kernel-smp-2.6.3.35mdk-1-1mdk.i586.rpm
 d12744fdab6bf6606ed13fae69b51f50  mnf/2.0/SRPMS/kernel-2.6.3.35mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFE7xa9mqjQ0CJFipgRAsAAAKC/kOcYUfcUldfx8MGy87CHigyjSgCeJ/43
JsyWup/H/+NRqjHU1SGHaGc=
=8KyZ
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47549)

Debian Linux Security Advisory 1097-1 (PacketStormID:F47549)
2006-06-21 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2006-0038,CVE-2006-0039,CVE-2006-0741,CVE-2006-0742,CVE-2006-1056,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857,CVE-2006-1858,CVE-2006-1864,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Debian Security Advisory 1097-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1097-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 14th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.4.27
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742
                 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368
                 CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274
Debian Bug     : 

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of
    kernel memory by exploiting a race condition. Like CVE-2006-0038,
    it requires CAP_NET_ADMIN privileges.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad ELF entry
    address.

CVE-2006-0742

    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1343

    Pavel Kankovsky reported the existance of a potential information leak
    resulting from the failure to initialize sin.sin_zero in the IPv4 socket
    code.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove() function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.



The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.4.27-10sarge3
     Alpha architecture          2.4.27-10sarge3
     ARM architecture            2.4.27-2sarge3
     Intel IA-32 architecture    2.4.27-10sarge3
     Intel IA-64 architecture    2.4.27-10sarge3
     Motorola 680x0 architecture 2.4.27-3sarge3
     Big endian MIPS             2.4.27-10.sarge3.040815-1
     Little endian MIPS          2.4.27-10.sarge3.040815-1
     PowerPC architecture        2.4.27-10sarge3
     IBM S/390 architecture      2.4.27-2sarge3
     Sun Sparc architecture      2.4.27-9sarge3

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2
     kernel-image-2.4.27-speakup 2.4.27-1.1sarge2
     mindi-kernel                2.4.27-2sarge2
     systemimager                3.2.3-6sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      831 fac953b669c78c37ea181597402b1c1b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    98672 717a42fcf8a6b67690a756b9f3f00aa1
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.diff.gz
      Size/MD5 checksum:     3962 fc1912f815afb314558fbadae87e43fc
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.tar.gz
      Size/MD5 checksum:    26319 368860bca1219d5777ab12dbc0713985
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1139 47ebcb365d37d7321eeee65b23920a29
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.dsc
      Size/MD5 checksum:      621 096115eaec61120211e0ba317b92def9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:    31646 1673537490a1af1a72ff1d65cd73139d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc
      Size/MD5 checksum:      876 2340c14db87e56a98e01dd17b095b7d4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
      Size/MD5 checksum:    21264 932ad64503240eedef626a0856fe5665
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1143 60abbaf01fa8d0f6ac0992eb08cb965e
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.dsc
      Size/MD5 checksum:      732 738178383acc2853cf8bd8b15861dc52
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.tar.gz
      Size/MD5 checksum: 15975839 9d7e6b12846c71e4d530375aacd1390b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:     9362 52942076ea9989d63ec619d0be8f324c
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      900 6a5fd70b803f4a0996b994d72d30c65e
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
      Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
      Size/MD5 checksum:     1051 e28f324bd15f8825721c36d2ad685f8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz
      Size/MD5 checksum:    11080 2813b0290efcd984fef6a69d9ca3c8e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:  1463783 1df6018893f9772d156ccf8e3080fb2b
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.+gz
      Size/MD5 checksum:   309066 ccf2db5585e30dd27b9eaf8d74285e70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      839 2f9746e3d73001a774607a2e8460dec8
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.dsc
      Size/MD5 checksum:      750 621fb9f1f76dc3fae5ed69f393ded2cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    54501 650afb6ddf33bd3c55d036c6e163f8d1
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
      Size/MD5 checksum:   741011 dc1085a42970fbb6f5174f8dae7f5bb2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1581 a0f54f9d6f61b4a31bdf49b2efa6a2ca
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.tar.gz
      Size/MD5 checksum:    17809 946929349518ac3d91c42825bfb6cabc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    31177 2d05a7a176dba04f37719199efa494b7
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
      Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      831 4aa4330d08a7829fbe9a548d1d8bab2f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
      Size/MD5 checksum:     1074 ef1ed7e19152004e160a48d320fed490
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.dsc
      Size/MD5 checksum:     1012 271d488ce319e95d567143228330e9a1


  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30482 64658643dc4a9554a722ff1b724c916f
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  4759092 15c5bd7f61d7291f1267c12733ffcb5b
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum: 31033502 47eb2bd29ad34555156eac2ec8160cd4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:    26664 88c43bac04065e47b6486bed94692e9e
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:  3580108 9542a6368e1668c0b3dd5529ba9c80f0
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   116802 a73dc8e6bb5119c7679d97d13b94cbc8
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30730 7cafd2b593e33cd0cb1ed5577a63142a
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge2_all.deb
      Size/MD5 checksum:  2419762 5e9e5072a78be7f12f2a499ee1116268
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    15944 00be5d0f60f2e89dec74ec2a76310638
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:   689772 9054c12e58f6b8c6d7f6055e94e3e2b3
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   631336 01476ba30e300b6b91a9a1a5d5c7f16b
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  9545000 c225981a19829b44b8b2e61beea177c2

 
  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge3_alpha.+deb
      Size/MD5 checksum:   272284 56ec516e9425c915a04a2a7184d15192
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge3_alpha.de+b
      Size/MD5 checksum: 16521602 4975ec76eb158179d36de7746cab88ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb      Size/MD5 checksum: 16966302 9bb2d088907ead2c2e689c139e945ef9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:  4573588 ad755c6e0a640be87f44d0eeb3cb0b9d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:     6930 5af591a1a57ca5b7b5ce7af39d0c30f8
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:   274064 b675644b9520620077d740f5033e311c


  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3145470 0e5c53017bbb7a84d554c1b6e60a0f6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3668438 2c00f060b5f4a599b1509e5625d766c1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  7331276 8ded6d50afd88d04fd9b601586509d32
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:   465160 61a35d05b6e9617ea9cec7ecc3ada43c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1692044 73cb9319b752cc5eaca4849e20edf6ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  4658994 b790e6512cd56ac98a1d9b5539c9d5b6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1056874 a03e9282e21db6a8094c8f2432a88e09


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12087676 c53fd67452bade39a41a4d07b1ddbd26
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   268890 b867a4d295e544fff9f5f0aa2a660762
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11713818 a039669989458b154e77063b9f2cd05e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_+i386.deb
      Size/MD5 checksum:   305120 bcbd70a2fc6c58ecf1ff373e398069bd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   300776 cba2acbaa7a11221bf20476dec02cc2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12340196 bb4547bd7a55cf5a863faf0eb787af72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:     9460 a52b72284e9b2ac4ea7249b9889dae97
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   293320 0cfddb9db531337f9220c787e2916002
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   299132 cf2755d7c9628bf753d4f9fc59df37f6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12682330 64e091ae35b42450a3f0af1af1b1cc17
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298354 03343347f66f3ebae64348769a8e7085
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298796 d5474dcad0aa041fa1bebffa5531a4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   298168 29f6f0af6edcc6fdc7b34fd33b4b45a6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   298236 251b20906cabdabc2689f8fad6238485
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11049672 7c1d176724d5af7ef5d92cf91a4b3a24
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.de+b
      Size/MD5 checksum:   300914 012fa2195bea70f63022c38ee8ece1b8
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2_i386.deb
      Size/MD5 checksum: 11992030 37b9f69b34c25ffd7f79c3dccb1c2b86
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:  1824238 b412dad8e3fa8ffbb88f9e24b720682c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   293678 293d14c82e8f2dc12d75d9ffbf07a497
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge2_i386.de+b
      Size/MD5 checksum:  4771964 810af192d449f6437de9c7b92bfc8f70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12420578 5699a644c8305231c6ff00ca615bc79a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   299016 8269e91daebb2aca7b360c15a41fa060
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12024800 595b16fd83e6ca0ca9b3b4df82934f72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   287484 80953396a754c47e76dc9c034fb2caab
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2_i386.deb
      Size/MD5 checksum:  7766984 0f4f4f9d1a0bc59ae4a2bf51734cfdfa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   299566 6165de4b3a2f79b3983d826f490f6c58
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb
      Size/MD5 checksum: 11303960 3519c2d9f88bcbbe6cd1a793bc21a092


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia+64.deb
      Size/MD5 checksum:   241990 1de0bc8938c45fdc763edc8b5be16dbb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.d+eb
      Size/MD5 checksum:   240416 d711a15e48958eaf0b0cffdb9afbe33b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb      Size/MD5 checksum: 16623356 6f87ed371e352b5ef736eeb9aea9b1e3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.+deb
      Size/MD5 checksum: 17020414 9748928c4403f7d1f708e4f1659ee56b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia6+4.deb
      Size/MD5 checksum:   241792 3f041268f31bbc7c13bb41f4b9b254d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64+.deb
      Size/MD5 checksum: 16980154 c21794a39eae3611d166574bc4d6c946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6188 510517c085a54b7f62b21fa549a28254
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6154 0ffa2668983b76eb117180f4127f443f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum: 16670542 5a5fc027a7ed1ea22de65134816ac27e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6372 9091687f1ccdd0a95238d4d8bf7a36b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6150 6862682a204020d9be7c3c7a24b58022
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:  4688294 fec3cf9e850845e1339b39eaadbfe411
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge3_ia64.de+b
      Size/MD5 checksum:   240852 525e38de6f834e7112097c26da92b929
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6178 c756f53c98ab21e53f097b2859433591


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2395830 74f11a8ca02e8a1cc776bf950e1d346b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2476584 4baad67d5c9bac3ee608a1f5b1d4dce0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2638370 76fcbcdc52016ae4feeafa765a3fc761
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2261274 baacace88b258a02d89ee5158269dc90
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2324432 202215777ec6ddca992a02551578bd20
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2543516 00b54f06d0e048692fec00cc8f888cf3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb      Size/MD5 checksum:  2395344 9326ce159e507c20e26fc4aa4ec9fa61


  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3852294 0b6ccfb76fed8400f453953d7421c2a6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3849540 57d70bee7ad3a52c2e41296a4b660748
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.de+b
      Size/MD5 checksum:  4681678 76bfca90e34781e213f64d92e412f7d2
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mips.deb
      Size/MD5 checksum:  7177648 16b29faa543ea16b0f0b1e4b79bcca92
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
      Size/MD5 checksum:    19330 f81dbe5f0089f55ccffdb5160fc14529


  Little endian MIPS architecture:
 

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mipsel.deb
      Size/MD5 checksum:  7040154 219d79c89034cc245aaedcc09c077253
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
      Size/MD5 checksum:    19372 f882ee84e76926b99370922778731da6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  3031408 2e21dc55f4e6c7d8e31485cab88b52a9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  2991822 83720b4706c20d32513fdc764e19a3db
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.+deb
      Size/MD5 checksum:  4686362 1e70d957d920f262ad64af693ead756d
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-+1_mipsel.deb
      Size/MD5 checksum:  4102944 4dcc900ca58f7d7e69f0020bb3237dda
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1+_mipsel.deb
      Size/MD5 checksum:  2137112 45fe0699fea23090cc4bc9368c6060e9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_m+ipsel.deb
      Size/MD5 checksum:  4670600 64746373b5c99a31c486fb360ec9048c
 

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:   155366 c357bb9b9fe6ce282b9bba63a0bdaec4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum: 13478728 3e7a96afb9b6bb0618a69d490d3df3e6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge3_powerp+c.deb
      Size/MD5 checksum:  4800960 668fb5a82d4ac36e66da1abff65e531f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum: 12750476 7f6aa3d1cc7c8990cf5ca2d8f5d5c128
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:     9868 61edb2922c82b932b5a51aabd4e3e962
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:    66712 0f1a666913413ccac067b519949b64be
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge3_powerpc.d+eb
      Size/MD5 checksum:  4683234 1dc1ed36b3052d676aece64519c79067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:   141276 627427945710a84e25f9a6e81cf52871
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:  1817290 168aae93e0888603a192acfb55c17ea4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:  2499398 6c3464992e5fd4f0c76bd6e456603b69
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum:   155380 29ef8c314e3ff4ad80a159e336f30cdd
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:   141508 23beb8633e1bc6c71cd7c85549ddc547
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:  4693350 489de2e942db258045c9a759940ae7a7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:     9944 b5f469592bb45ae907c251aa762e5cdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum: 13785644 b44ad17d6469962e8ad89a36e0069b0a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum:   155614 df66fe84dfcd04edc663ecfc295d5a60


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge3_s390.deb      Size/MD5 checksum:   993502 707589c970f190bed95035dad442b9d3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  4578888 53c705bdfebbd3e6985807f041e94612
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2970498 9c2e84a24bb629db2544929cf19f2087
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2778530 d7d6115aa9292ff635476cd2b17bf499


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:  2024732 192d85db979604781d849025a1f44ef2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  6546074 5865128021dbbc98f9a6c20e6fc574d9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  6379672 b308de13ac8b140e4a4d06ccd500b9e6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  3787334 543e98f2a917fbc57bf8a02c580491eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   165654 db2c3fd02eb51afbc1ccc98152a25784
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   202328 7df862f501733bef8450ba2bacc97b2a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   203806 5f0bc79951ced443e6ef009010b679f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   163860 ccb65e6e653600dfdbe81fb9f0839789
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:     9496 00a3aaa8a2c3cb84274e1155d0663fd1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  3601802 050ad637bd78c94c8819e553a50b51ae


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEkE03Xm3vHE4uyloRAgWkAKCizwMprLUoRTgrm24rKhy0Aq2KBgCfXUZW
VtJv32nxyaV0CN7g+A8yj7o=
=Y5TI
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F46107)

Ubuntu Security Notice 281-1 (PacketStormID:F46107)
2006-05-06 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,denial of service,overflow,kernel,local,tcp,vulnerability
linux,ubuntu
CVE-2006-0557,CVE-2006-1052,CVE-2006-1055,CVE-2006-1066,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1525
[点击下载]

Ubuntu Security Notice 281-1 - Multiple vulnerabilities have been discovered in the Linux 2.6 kernel. The sys_mbind() function did not properly verify the validity of the 'maxnod' argument. A local user could exploit this to trigger a buffer overflow, which caused a kernel crash. The SELinux module did not correctly handle the tracer SID when a process was already being traced. A local attacker could exploit this to cause a kernel crash. Al Viro discovered a local Denial of Service in the sysfs write buffer handling. By writing a block wit h a length exactly equal to the processor's page size to any writable file in /sys, a local attacker could cause a kernel crash. John Blackwood discovered a race condition with single-step debugging multiple processes at the same time. A local attacker could exploit this to crash the system. This only affects the amd64 platform. Marco Ivaldi discovered a flaw in the handling of the ID number of IP packets. This number was incremented after receiving unsolicited TCP SYN-ACK packets. A remote attacker could exploit this to conduct port scans with the 'Idle scan' method (nmap -sI), which bypassed intended port scan protections. Pavel Kankovsky discovered that the getsockopt() function, when called with an SO_ORIGINAL_DST argument, does not properly clear the returned structure, so that a random piece of kernel memory is exposed to the user. This could potentially reveal sensitive data like passwords or encryption keys. A buffer overflow was discovered in the USB Gadget RNDIS implementation. While creating a reply message, the driver did not allocate enough memory for the reply structure. A remote attacker could exploit this to cause a kernel crash. Alexandra Kossovsky discovered an invalid memory access in the ip_route_input() function. By using the 'ip' command in a particular way to retrieve multicast routes, a local attacker could exploit this to crash the kernel.

===========================================================
Ubuntu Security Notice USN-281-1	       May 04, 2006
linux-source-2.6.10, linux-source-2.6.12 vulnerabilities
CVE-2006-0557, CVE-2006-1052, CVE-2006-1055, CVE-2006-1066,
CVE-2006-1242, CVE-2006-1343, CVE-2006-1368, CVE-2006-1525
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

linux-image-2.6.10-6-386
linux-image-2.6.10-6-686
linux-image-2.6.10-6-686-smp
linux-image-2.6.10-6-amd64-generic
linux-image-2.6.10-6-amd64-k8
linux-image-2.6.10-6-amd64-k8-smp
linux-image-2.6.10-6-amd64-xeon
linux-image-2.6.10-6-itanium
linux-image-2.6.10-6-itanium-smp
linux-image-2.6.10-6-k7
linux-image-2.6.10-6-k7-smp
linux-image-2.6.10-6-mckinley
linux-image-2.6.10-6-mckinley-smp
linux-image-2.6.10-6-power3
linux-image-2.6.10-6-power3-smp
linux-image-2.6.10-6-power4
linux-image-2.6.10-6-power4-smp
linux-image-2.6.10-6-powerpc
linux-image-2.6.10-6-powerpc-smp
linux-image-2.6.12-10-386
linux-image-2.6.12-10-686
linux-image-2.6.12-10-686-smp
linux-image-2.6.12-10-amd64-generic
linux-image-2.6.12-10-amd64-k8
linux-image-2.6.12-10-amd64-k8-smp
linux-image-2.6.12-10-amd64-xeon
linux-image-2.6.12-10-hppa32
linux-image-2.6.12-10-hppa32-smp
linux-image-2.6.12-10-hppa64
linux-image-2.6.12-10-hppa64-smp
linux-image-2.6.12-10-iseries-smp
linux-image-2.6.12-10-itanium
linux-image-2.6.12-10-itanium-smp
linux-image-2.6.12-10-k7
linux-image-2.6.12-10-k7-smp
linux-image-2.6.12-10-mckinley
linux-image-2.6.12-10-mckinley-smp
linux-image-2.6.12-10-powerpc
linux-image-2.6.12-10-powerpc-smp
linux-image-2.6.12-10-powerpc64-smp
linux-patch-ubuntu-2.6.10
linux-patch-ubuntu-2.6.12

The problem can be corrected by upgrading the affected package to
version 2.6.10-34.17 (for Ubuntu 5.04) or 2.6.12-10.32 (for Ubuntu
5.10).  After a standard system upgrade you need to reboot your
computer to effect the necessary changes.

Details follow:

The sys_mbind() function did not properly verify the validity of the
'maxnod' argument. A local user could exploit this to trigger a buffer
overflow, which caused a kernel crash. (CVE-2006-0557)

The SELinux module did not correctly handle the tracer SID when a
process was already being traced. A local attacker could exploit this
to cause a kernel crash. (CVE-2006-1052)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

John Blackwood discovered a race condition with single-step debugging
multiple processes at the same time. A local attacker could exploit
this to crash the system. This only affects the amd64 platform.
(CVE-2006-1066)

Marco Ivaldi discovered a flaw in the handling of the ID number of IP
packets. This number was incremented after receiving unsolicited TCP
SYN-ACK packets. A remote attacker could exploit this to conduct port
scans with the 'Idle scan' method (nmap -sI), which bypassed intended
port scan protections. (CVE-2006-1242)

Pavel Kankovsky discovered that the getsockopt() function, when called
with an SO_ORIGINAL_DST argument, does not properly clear the returned
structure, so that a random piece of kernel memory is exposed to the
user. This could potentially reveal sensitive data like passwords or
encryption keys. (CVE-2006-1343)

A buffer overflow was discovered in the USB Gadget RNDIS
implementation. While creating a reply message, the driver did not
allocate enough memory for the reply structure. A remote attacker
could exploit this to cause a kernel crash. (CVE-2006-1368)

Alexandra Kossovsky discovered an invalid memory access in the
ip_route_input() function. By using the 'ip' command in a particular
way to retrieve multicast routes, a local attacker could exploit this
to crash the kernel. (CVE-2006-1525)


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.17.diff.gz
      Size/MD5:  6119188 5d24ad7432f286cf30bba4ed47ffde41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.17.dsc
      Size/MD5:     2511 6bf5107129d9c2b80b4fc5cd2f61eb41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.17_all.deb
      Size/MD5:  6777762 e930255ff3a9a36f4d02ef9291addd69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.17_all.deb
      Size/MD5: 37516664 3c13034a12e30dc34c0f20054dd4ba01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.17_all.deb
      Size/MD5:   505748 b65c71096d3b35745e9eb42bb9bbcc33

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    20834 5b18b2a14dee825d5509985f681c8926
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    47402 a0d2cd86d82bf80975df26d3aeefb13f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    88896 882609fe601f9022aceffe9e0b49e171
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    30020 fa23643a9ebd551bcfdd30dfd72111df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    41250 d9f148d8b9551e749ca45fb81e3ae41d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    73602 218b54beab0fa43a0a3049b02b3ee55b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     5744 69fb2f1c9c28b390dc12cfcb18e9cde4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    34858 773ba5bd3561fa3fe479512916109387
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    55184 54a70523827f85efa682575f76389af8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   112954 d7c23a2af2234f7fbbcd0d5f29a85a7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    40822 0b914ac267c233bcea1c9f6594824ac2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   115722 bff2a6131f3ad9fc50c9793e0adbc623
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   174636 84c510f9d87ae279c36a3e281c60a532
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    82586 8c2b6a31b1c97cf46c8990782460c050
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:  1467686 e1839a06cb8b4aee99d4d8541a8ef2cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-generic_2.6.10-34.17_amd64.deb
      Size/MD5:   287286 255df4b30927f1d654c708003bdf70a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8-smp_2.6.10-34.17_amd64.deb
      Size/MD5:   284238 9ba4f125a216753384773213669d739d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8_2.6.10-34.17_amd64.deb
      Size/MD5:   286214 74e9e962dc3cea13e3d3aaf213c0397a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-xeon_2.6.10-34.17_amd64.deb
      Size/MD5:   281712 cd9bb115f8351d8b7cb4ea7ad3c7cf76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.17_amd64.deb
      Size/MD5:  6138588 e663993a2f55fc15b6dc1c859c35d2ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-generic_2.6.10-34.17_amd64.deb
      Size/MD5: 14579542 acae125833fc56bb768588edf6e1fb6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8-smp_2.6.10-34.17_amd64.deb
      Size/MD5: 15123102 7104ed953377decf29824f098155f315
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8_2.6.10-34.17_amd64.deb
      Size/MD5: 15091784 ef00bcccad9ea92085669a849e0b2189
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-xeon_2.6.10-34.17_amd64.deb
      Size/MD5: 14963272 7b2cac4cbed83f604eea590796afc0b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.17_amd64.deb
      Size/MD5:  1361754 9ccab2926d030108a7674f3d0b2c147c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    14222 dd41ce4690d0344a279c4f5ab771dc23
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   178510 4a0bddd6f098dd3f55bf5b6d7bfc3e3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   174894 153af82a009c0eb6c0ca27db75b2b527
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   731210 de0d58ec6d6115a486c05ec384b97969
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   780902 14c98539fe16709a51a1de8d1b0f9007
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   150054 b7924927667920b95b82a4e892507c61
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   168120 a928eb0f7d61c1093065f45c1e2a0b33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     9558 52f6e6ea6f89e58cadf8736b33e66989
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    94860 918a28b5dcc9c17c05912c7b82ebe4fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    45728 ad83d6612150e82d5e32c7d40edce9c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    33162 275e69495b64afd9a198126089fe7c3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    55290 bc2e4fe6d0e0edd982d7330fa6714b0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     4662 491f0f4010fd14fe3b696a92cf268a30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:     7838 b64af47cfe6ee6db67389fd77bf7a66d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    53808 5a6d49560e6ff8bf17b2a78926979e7b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   111110 8683b2c2a067b334e6d80dfd4135eebc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    10152 b501b2928b8bba1bc11c3c8c173db946
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    60466 26760ef3d305ea3697b4f872bf505d15
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   208568 97cb43a447112139699ec552af88ae73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    69268 18285324ae965b571455e0663300447d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   394812 b93a3876c0c2a01b07555a3b4d497226
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   294496 b5b2ba47ca6c0b5f4cc1c847c0c31623
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    12070 3e405b634e824a86309cfbe96f8dacbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    22658 d60857cb2ebca5bfa2b1b94940aae5b8
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    28802 f4354992e2dd8cdda902424d8acec899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    56792 c11406512b24c95a073d07012b130f26
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:    34938 fd1957702f09517fb5141ae29af47129
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.17_amd64.udeb
      Size/MD5:   247472 8a13a5da5132ac37f805c5fc10d9bd26

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    18172 1efe24235cdebbd29cbed9089bd007dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    44826 bf44543b5b443b65c012b67f4b879cad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   103060 fe39319ea2412c7a1dfc410970baa761
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    86018 8a623cf608b18c080016b6bdd9621b49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    29090 83af3323810e99ffe231b9d3b8bde3ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    39774 6e5250232caaa689e2e0e2115f84efe5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    71168 b3b21a750c6d83ef80e48ea6b7f94373
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     5504 c4bcc75585f88f2e87eb054bdebfe710
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    31584 0e80a15801f2986ab51eea41cb2ed3ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    52940 4adaebcd58503a06d8c228412d926e30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   104470 5a3d6af98939720684968f35ea423a97
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    38630 228fa036d82b3d30abb9377513652f89
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   114520 2274e9db1e5d30729b93bede84c14225
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   190632 7ac4363855022dcac8e319b140859ca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    86546 556e336b500c862d4a3dfcbfdd33592e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:  1390040 27df47a9c31a11bb27fbae7d231279d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-386_2.6.10-34.17_i386.deb
      Size/MD5:   315848 35bef7a21ef0fa1ad34a5a25997d2fbb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686-smp_2.6.10-34.17_i386.deb
      Size/MD5:   311496 1f7f54442c02acaab368f2335c615208
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686_2.6.10-34.17_i386.deb
      Size/MD5:   313926 e90150cd095766dbd8bca5bb403dee80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7-smp_2.6.10-34.17_i386.deb
      Size/MD5:   311966 01ce05397e9a8adcf916d5c540fe74dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7_2.6.10-34.17_i386.deb
      Size/MD5:   314146 0e0da52fecbb1b1aaadb0a06285063c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.17_i386.deb
      Size/MD5:  6135472 a207ba5e0330b823b50b77f26cb1896c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-386_2.6.10-34.17_i386.deb
      Size/MD5: 15613184 05d2c3ff3d7938115c9a86b47e96b7d4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686-smp_2.6.10-34.17_i386.deb
      Size/MD5: 16191470 df26b98b3ea1549ae35a0a8f80103aaa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686_2.6.10-34.17_i386.deb
      Size/MD5: 16608578 8f1669a6a4251386078aeebb6371aa85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7-smp_2.6.10-34.17_i386.deb
      Size/MD5: 16302938 e558b74fa53ea05bf009bd81089ccbbc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7_2.6.10-34.17_i386.deb
      Size/MD5: 16672646 136da5f5b2e11eef25ab19088d3c2c80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.17_i386.deb
      Size/MD5:  1361606 b4ea92c5afb990ea15f250a47768e182
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    14078 3da8c4375be7ad83e03576169bf0a8b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   183206 68e0ebe51391326389abe2625593d152
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   172778 0f9ec085ff74d9988683420c8a0e1d80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   967874 f5140974f1dfffcbc3b5ee673705d5a6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   780692 752501902783e1b5ca300e29aecdf40b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   140658 8242eeb7856dfc3b6011579c6c4029ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   167944 710db8c73988b84a29a071e1534b1234
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     9346 316a65f4c73d99aa545d629c76ad8818
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    89326 92aef7e00bc1e73ffaa7967052f77a52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    48136 a442a715bd877836bcd75f04d95a1f7c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    30888 5fe6b9dc306c6fdc1969359431d96b55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    65898 f4361c3bba7cd804030918e2a5a71028
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     4508 44801760087bdb0fe7c4cf0184982cc7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     7752 591ed96a68aa4179a9c102c9959abe5a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    50772 beafe9ecc552d4490e11e5877e465caa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   111590 6539c43357bb9d57a08041ea846b36b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:     9890 8e4548f453f5f61480ddd32b07a0ae02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    57150 b88ab321f5d8ba1f0f285ad3c51727d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   242022 d6bd5464f9e0f38ff47ad5922b15ab32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    66238 084743b6a460f656922aeb8227a8b7ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   436602 6eaba7837ac10eadd63ff56af4c557c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   485668 71cd27411c9701a7224d8065ac631880
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    11476 c58eba7c421b06363011a2f5d07d9abc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    21246 ecba8bd3bb14a9808ccc0127736953a7
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    29530 fcefac26b8b8c504f0e2216b39f9a237
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   106274 cb66f1386c6863bc2322cdaebc778bc9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:    33824 c38a2cf8d306838a9e24a326dfd35405
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-386-di_2.6.10-34.17_i386.udeb
      Size/MD5:   261336 a795fb501d1bd255d80111df26edd1cd

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    24062 5ca002af900f77c15c6cdcf107380417
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    24058 47b70dad2a47caf215f45e3662616a0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    24048 fb87b9e1916b46dedc0d6438e64e591f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    58282 517dd642e1f14a078a0c3658068792a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    58288 fa7c0cf233c9b010973cd82f4423f792
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    58264 16e4aa93b6945418501a1c6cd7689fc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30292 8bd77fd7d4089d86ea26fd747bad75d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30290 2439693c3b4d57cc12cd75656e438b0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30268 9f9203bb1e8b9015d9f45992ef68f022
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   109252 d8a86f6c3bf52b1319336321fe49170f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   109250 d761b45c66f90a5931fd13ef450c6c31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   109228 8604861f017f3e1ede83f30f70abed5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35388 9df7c0b1eb7dd24135908d78b23ee172
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35396 bdb9342e3906988e85df906b58d889ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35382 342f25ab0fe66d84674c9b14abea47a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30936 e25e45df35cbb2e9f96677cb9926e936
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30936 cf6a027b3d0a1c3d9403160463a9e4e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    30906 1380fb8e79767fb47b86db8917c4de7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   212970 c649b1e264818fd406667639f378c9e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   212952 eb2379db2dcd7f0a7daca79addafeb3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   212932 7261a14246d8245610a57beeb5b690d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     6170 3c410f2077da26ad3f9a317a69afe234
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     6170 31e84686c6052acb998acb3cadff4c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     6156 81f3906b61d167b0c3c378675d6b66bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    43436 9042696bf6d6e35b1af2af32fe95556b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    43422 a79e72218f997905499ac71a4ed47145
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    43416 edbf43b14f4979a9fa9e588543382684
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     4584 3e72bd08c7ec62eb41d7f5b080b5b0ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     4590 05851f70d4cad42546fa452c2167765d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     4588 6280c46413c92d50a0228804b41dc6b9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66048 34ed32d4ba30c5501138d5b675750abe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66038 59e8f1538dfb4f133595e339663592d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66032 7b188dd6f1c79dcfd836c9b19bb3a3e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   117114 af8a9ed28cc301ab1a0812983cd88178
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   117108 6d91fbbd2e6bc6bff62c7a4475c4f41a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   116856 b46c6d49fad11f05461b0b2752ffb1db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66650 78fc85ce37f8028857a6c2c3b18ac591
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66648 40fb254035d301a4250c9d4f138890e3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    66632 e57835c7f5efdb26ecd887057f3cb51a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   142050 4ce4c19bc4797b343b8ca0ed56713df8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   142052 da3bb26c089dadee6c1f68392ae74928
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   142050 3e298fa292812ec514b05843b8f49ca7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213984 33784a06890d04b06cecac3b6bee7344
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213996 4711f2846fb3fe94b1f462cd52c11d30
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213948 a145b7af56d4720a3b43638d4dd64137
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   107008 929122127c0f943db0c0566252b7ba13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   107004 35025460601b1cc08f3a27e922c6b029
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   107008 2f994926592545893a9cd38e50d7677d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:  1866712 8aeb5ea169e6498f73c60c431bdf5be2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:  1871106 3d195efbfaadf7284644ddc93c1b1307
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:  1901484 a078755151eb846290ba2fa368e01883
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3-smp_2.6.10-34.17_powerpc.deb
      Size/MD5:   251118 ceeadf1d0353c53a989cf299b29ff7ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3_2.6.10-34.17_powerpc.deb
      Size/MD5:   250598 a7d85ea78247fe5923f6070073efb371
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4-smp_2.6.10-34.17_powerpc.deb
      Size/MD5:   250836 fab084ca1c6c181f4c678e83d555fe49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4_2.6.10-34.17_powerpc.deb
      Size/MD5:   250350 f757388d87fe1782faf45eb56bab26f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc-smp_2.6.10-34.17_powerpc.deb
      Size/MD5:   251330 3b30005aaf6fdc06fe93fcc9655d894a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc_2.6.10-34.17_powerpc.deb
      Size/MD5:   252018 b383c5848968e0d4a4fb404242eee89c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.17_powerpc.deb
      Size/MD5:  6156700 418112ca048915fc05c9e7362d14653f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3-smp_2.6.10-34.17_powerpc.deb
      Size/MD5: 15647116 7dfa4a5a4547ece2036a2506bab1f67c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3_2.6.10-34.17_powerpc.deb
      Size/MD5: 15210074 e79f07b65fc1aeafdc3ffd3af4e6c21c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4-smp_2.6.10-34.17_powerpc.deb
      Size/MD5: 15635114 dedd641b0e3642732c8ca9c5ae55fb33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4_2.6.10-34.17_powerpc.deb
      Size/MD5: 15204542 d6a78a9452f7b6dbf6d64af66240d755
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc-smp_2.6.10-34.17_powerpc.deb
      Size/MD5: 15552194 d40235d5797935e05bf7418af297ce9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc_2.6.10-34.17_powerpc.deb
      Size/MD5: 15245150 111d3df321b02a1413f04344e250b916
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.17_powerpc.deb
      Size/MD5:  1361404 421257489f6cd83556bdfc046788234f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    17360 e3bbd20cb9459cd3bd25d0ba23ac5204
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    17356 c4872e5b5b15eb511b2f3f1ee82589b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    17350 65d3da1238892b0f4e559dd29067c554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213720 6ef31d873bd8e8197c60cbf0eaa6475b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213732 d27624bec1181f7b07c4662143aa1ab6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   213448 fa86ff7233428f3a0d5ff59b3ba8b6e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   210744 2fa78c019366b5f7ebd8bf125638cc21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   210748 062fbbabde3f38e1d282dba4b8caa64c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   210728 fa42ea4771999774d929335eeca3ab5d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   688494 9be163087fe91ab5f022a91bbaff82f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   688464 6bab41fc809c3390fe70181c94884da2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   687010 4638bcfa2599d4fc8538dbd5c77083ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   780764 9900799b4a97ecd655f60b673a19e3cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   780750 15dda67190816547d574343e04174f1d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   780778 04279f1e7c5ed32bff4fc991f372fed2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511286 accbde7bede5f307da34c9bcb0d9fa40
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511270 ccfcf14c73070c7dd90ea26100f53962
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   510932 a18ab9c51138440c6e66a85740435fd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   257750 38d5746e3f89cee42347d78d07429d8a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   257762 225e9c23653c3153d428025292e05279
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   256882 0bf7e249e7efa4e81a2c6ce74ea046bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    84426 f5e27cdd2b65e76c3ff3d25c18d8ca46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    84434 c1a5c6b54312f3c78359b03fa2053841
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    84414 b0f068242bb9e7bcf28f7d5d28a1a8de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    60988 e3ed99bcde5495f1dcb1e23ebd4cecc6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    60994 16dbba2a1557416f68254aacdc7fc062
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    60994 d5e875db8be1f9dc3c1371f449df2bed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    65014 138e2104e9d6718cdae3435bdb6dace3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    64996 d3a65bc43b6ad081c98f5a024ef6705c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    64996 e439e88878e2c3ea816ec1e31c9ed7ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     5382 e41a0d60e63f3154075eb851533bae06
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     5378 9839d9d6e2f78e0df4c8ddb32b0e3ffd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:     5372 d0377e57c076077a67233f259abab556
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63270 c4427275a0bb9821e8971010932a96e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63282 6b8193ffa6b20de66d3285d6177c3e5d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63226 53da1ed9852175997bfc125a0f4d516d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   131656 e2590affaeb7b58b6737304552a2064e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   131656 00dd8fd8b24be7e172b2f00199e71adb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   131668 0f5faa34cbc5db343550cc7616c5a1b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    70992 62dd2b20e0115d78f6d39ace079b74a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    70980 24521450996a14d4f3e9e47d567fd33a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    70972 2fdb59cd683537497fdc08b309c1d467
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   357328 b27495899f720bb58b7bbfb5427576ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   357324 6071a7ba12c3cf2f526cc885278f9e31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   357336 5d11399007f80cddb85f3662f050da5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    80738 bdbed540e11e766c2886d5f518cf4f59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    80736 fae6d64dd5c7355d951232f619e16950
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    80742 6c446d7d8ac3d728441643f069416cb2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511018 d68a045a31de33a3c0887529c0e7f830
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   511010 b04d21a5681939d52b2d940c84f2480b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   510800 4a4074b19b5e2653bb47833d2b82df99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   389166 80a0600bbd448ac367f92bd7ed568022
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   389150 105b2d4cc18e37d68f0c9ad52ca04c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   389020 8fda1f55b6f1f49ebe9c3e90094ced0c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63158 7d5551b5ac5de5f5d5671dd5eceeb250
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63156 a3acd6dd5cb3935ce27f9dba801f8187
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    63040 90af2a324ab227b1008d86f09546c879
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    23352 6c9701066ba9e8265a5d4c7f4e6c3608
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    23354 548437458562e87cb4356080399f618b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    23114 4711e4b2bedcd42d95283627372b7264
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35384 ce3cb50b5837dfca56b78e8073180052
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35386 20fbd6f9dc3f672bd86c9a3f15ea49d4
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    35374 7cc90ba4aeea92346e322f27d610dc70
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   135106 a06d70bedaefee7c15d45f125709cfe7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   135098 ebc9956341e719190bb4f9c1e22b0a9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   135082 bf80f8fdab73c9847df6ddfe1a484360
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    42402 96f7b9f5a73a687fde6178d772834dac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    42394 089bb0804783a69ff88fc3b90d044b92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:    42402 c3ef3d019f80d4361b9878ca5f9a7506
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power3-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   294760 3fa8968e0283e17fa9edbe98fdc6fa4a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power4-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   294760 a65dd2de7f0958f9ad3719b0617a7d11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-powerpc-di_2.6.10-34.17_powerpc.udeb
      Size/MD5:   294756 e881fddd33a9f2a499b0d135eec9b9b8

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.32.diff.gz
      Size/MD5:  7938989 23805c9f750752b597669dba7066b487
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.32.dsc
      Size/MD5:     2516 47bb056d4913b3416d9114f021d748af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12.orig.tar.gz
      Size/MD5: 47177098 9272115d4005d4e9773a1a6170fd20cd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-doc-2.6.12_2.6.12-10.32_all.deb
      Size/MD5:  4551650 36bebdb12dc8de941a8021f604a1d5d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.32_all.deb
      Size/MD5: 40452074 7afbaef9aeb2413fda62ee265be41c85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-tree-2.6.12_2.6.12-10.32_all.deb
      Size/MD5:   376602 698576da8b0199eaebdedfe964eddc50

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    20804 6450e663d533cfeeadaabf04b6db510d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    45608 6ef82a44a80bd71b3235a86a29b8605a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     2318 e4952b056356685c2881b041bcc9268a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    88700 6d84cecef9f6eecd5b6b128dcec29ee2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    35156 4cef991c1dded478d7f9219d1cabdd46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    42374 11b914bb0fb4753bf2a8102e7332e512
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    70522 8a855b203da30ec41ed4d26ccecd3f0b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     5742 95ef6282ef4436b7605a5c097941f643
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    34330 189c7e07477f1f469e8f710825354cae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    53480 dbe18c020721243a3bcca668c360cd21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   129586 9af2c32e3cb59d3f249a4b7c29292231
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    43842 d0fe92cefc8f0bf24a8265e4629787ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   115020 bca994a5f41b45bc15f8c9956b0c8814
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   253682 8ccd4ee726f596dafd048427144b1c85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    83362 31c0324f9d8d6f3878f45809abce8fea
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1497830 baf438ff2c43d3673a46d6bf7f7e0a23
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-generic_2.6.12-10.32_amd64.deb
      Size/MD5:   804402 a331cfa4254a013d8f398b43e191b7e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8-smp_2.6.12-10.32_amd64.deb
      Size/MD5:   802436 b4c50f9f6dbf6a45e10750f7fcf14fca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8_2.6.12-10.32_amd64.deb
      Size/MD5:   803422 f1901081b75fa62619c290b5e96c6e09
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-xeon_2.6.12-10.32_amd64.deb
      Size/MD5:   799580 4fc8da4aa88dd4e9b3ee7555b52c0e39
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.32_amd64.deb
      Size/MD5:  5917118 72ed7852e6ce056500b6f268277e3da7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-generic_2.6.12-10.32_amd64.deb
      Size/MD5: 17088096 9811f318cf424ac8c45d97e5f675f73f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8-smp_2.6.12-10.32_amd64.deb
      Size/MD5: 18132072 d448c9ffb34b00cd60a842b4f4639366
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8_2.6.12-10.32_amd64.deb
      Size/MD5: 17953170 f8e5701d039aeffaf89194e23f8ba205
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-xeon_2.6.12-10.32_amd64.deb
      Size/MD5: 17898510 b027f3ba22ed9d7a67dedfd1e0224149
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.32_amd64.deb
      Size/MD5:  3488116 4338e1d86d5a7fb785d0406421d2ba3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    14296 a1b364bc6d46efd19aa60236ce99fd9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   191796 bac05d8c1f37b11861e0428857f22f0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   170364 60e70f4b6d12420ebe4b7bd077ff9364
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1048482 a5ed3bb0f2837cc872e125086270eabc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1147242 b22c1070285e8cdb7fbb01b03268be84
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   122454 9224e06ce51520666d18acdbdb90e529
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     8544 c2a232505700015762a1d2606d8178f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    99028 3a081d34ff3a3e10ed426501eaba328a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    44950 d473d502dc3ae3ad5439a8f0b3fd98e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    31652 02abb3c22728344c09a289eeda4262f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    65700 bec821e32c424e447a96e0848191b9af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     4476 68498d34fc12bd0d998f49931102564f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     7880 fd761ffd8fad3e1665d9550928667d96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    53862 4b4d83d2b64a4a1aea473ae40315018c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   107330 ef01943f55c621d14a09936ba4f931f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:     9884 03787387778b092b24270be12c0ca745
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    69766 316920367ced519a815d2a7774466fa3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    73056 e1ee27ada2256a7f198c079902d7509e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:  1271020 537e17b547c6cc9e2f9995d5046c017e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    58394 e99cb673ee7d55a3b3bf172180098657
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    22208 9a4216b4773985029cf7a9043841786e
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    29358 026acdf308ae0f006522cdf69dd5ba14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    62186 0fd5a02af49cff1942475ed7f0066286
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:    34966 9a381407c7f1c1f8448fa86b2a8d347f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.32_amd64.udeb
      Size/MD5:   248878 68990778c4c1db458e1c3d8944cdc178

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    18676 2e72a51c70d38a761d20e6e824885a55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    43950 66bf118ccc035fbd05a159640e9ac97b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    96884 9bac478e95c49bd294e47c37f9e891c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     2280 86a8b1d6593a79def3a5350dcc089cd4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    83574 09de6f01e2db27fbf0a02def3fba8c73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    33144 b0365f4e3b0701a1a1d296a39f32fee4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    41918 6fee95e9df76e1d5e099e935b52a3dfc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    68230 49a57cb468c3bbd0722f43468e63aebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     5360 d933352d994e7356921cd5a1b7abdc5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    31130 c7a84f8228d65723b601ac8029d6c0fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    51410 71606abdccbd62852107ff6531f56c5c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   123396 798be76f90f270bdd302d5d6c94a41cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    42478 0df936ad5c1cd0d45ccffe8fcb814753
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   110270 dafc5eb481d93bf2a498eac6f36b83b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   239816 10a5bf5d58c103cc084d1a33d64b163e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    86174 e0866876938d74b1e8427c2d998e6a24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1417848 749517515374a808fa65acac208b2f7b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-386_2.6.12-10.32_i386.deb
      Size/MD5:   802150 73ec6f592c438cdeca7c842f452ef7c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686-smp_2.6.12-10.32_i386.deb
      Size/MD5:   797500 dd206713958dd2367b66f95548039751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686_2.6.12-10.32_i386.deb
      Size/MD5:   799248 51e29975a302f623568c7d6f046420c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7-smp_2.6.12-10.32_i386.deb
      Size/MD5:   797644 4c08d3208842417c34dbc97c5e46a8df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7_2.6.12-10.32_i386.deb
      Size/MD5:   799836 635c2f89ea565b154e0c2d9dab9f1989
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.32_i386.deb
      Size/MD5:  5926676 7e2b893f996a8108cef752d73c7df97a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-386_2.6.12-10.32_i386.deb
      Size/MD5: 18027126 86905e8ef5251d201a09b7ed2d461bec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686-smp_2.6.12-10.32_i386.deb
      Size/MD5: 19367732 23ad01c0e7b0fd5578a3f5651a2f1282
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686_2.6.12-10.32_i386.deb
      Size/MD5: 19461630 01c2fb17a1e14d55449d63a77aae5024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7-smp_2.6.12-10.32_i386.deb
      Size/MD5: 19501386 093ba38260bca294d5029a1d9187f32c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7_2.6.12-10.32_i386.deb
      Size/MD5: 19545014 5e662d4fae8b3aa7dd29935d72dfc0a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.32_i386.deb
      Size/MD5:  3489778 d94e484d9bff202865c99067419e4e6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    14532 e5cc951093a967eb4a6853e5266a8356
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   194798 b9302c3d2290b7412beaa36445825dcb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   166502 20a3b8b9f199c76e758aaf1dd09887ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1048128 e3959026d4be8ae194db8b2b83e83864
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1341400 4dd130d4a566b7f643b33650ae8781e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   123680 0cfb0520ddd7c05df8208b16e16ebc14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     8240 61a7cd3483de82e5eb991db29aae1029
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    93374 5eaffed9a32f1a0b10e494ab2ac234c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    46818 70a30bb6d18341f3b5669e28a0dbd198
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    29770 15f8ac24e57f1d2d2c042e2ca2157679
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    72278 78fccfa9ee288ed8b05e5c6aa472e83c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     4260 1e708a46d747ccbe5ef225721872ff5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     7664 981b184d0faa71f3b7d53defa103fdff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    50630 a14ff53291111b5433c80836d67384f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   108632 9fb3185346fe1ec523908260e1c69f3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:     9806 1f9ca6e75a79ec946e1104e55c1ee1ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    67642 60628ce461391ddee38f266bdfc99497
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    70180 c111d4dd2f65fc2e39906d129cc337d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:  1481128 c97ee377d12b65a101d9c36ac30bfcb0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    55206 2266ecc681ef65147f29998cfb384236
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    20354 61f1983d39d036faffda5399a8a0b1a7
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    29916 c8fc99af3fa9a7a459ba306ab5947bfa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   111222 06311a3c953cd2d13db22f95d36c4fe9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:    34560 1b0ccb7f362f98cd60b0c7892bc5f8a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-386-di_2.6.12-10.32_i386.udeb
      Size/MD5:   263264 f571e25958a863bf226443e50bb4a8ab

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    23364 e43ca2efcb4d199b7bf8d02508a89397
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    26346 b40b92a9572ab373726da6f2b946cace
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    55912 33af725ded6b1b680ab15b9186293d13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    58824 358ee9fb92fe6c278addcf97da6999f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     2312 45dfdd0ee00162889c9e17071b2a45bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     2506 2cc50efc86803d95a073b0958838dc20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    29752 5c35199a12f0f341b00260a32264a808
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    34722 3dad9455aa9ce6307b9c1bde145f6ef0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   104676 a004164ab148162cddb131c2f269871b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   122186 b3c9aaeb784a29a678bf0f005ac842c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    40504 d3ee42f832e62e4618bf6de2e6b2eb37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    45896 42150d82c98896dbac811f17431ba38f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    29002 bb4c49f824a3976d70bac638b44bc3c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    29934 ff235e5457895e0a9ff231468b85b37d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   210094 0039c5fec3a8a5200550c50624887c21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   224770 48d2c4097a953bf27f495bc974dcf1ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     6144 ad95cd01747ae46fb1dac9df410c5f69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     6960 6583c068ad24876a03061d0b4e2c89df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    45170 3a07ad0188304f956197bf4852ce6807
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    40416 415712ed596fb0633fae15c2491eaa15
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     9802 222d1e4d6a01116665ff55c36ff30c9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    11778 c9c1a100b9ed5bad38828d005009ea51
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    76786 05dc1e6b912cf8d7050f1a100a972468
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    85192 04f74fb6e1d7f1fe892b7dba9d6e6d20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   112166 9061da2806cb00e6a6252090477b501f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   129220 84d65169df101de4e69aacaa46ce411a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    76742 ca8320afa7135941a3013d34f9e7e48c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    90406 6dbb327fcd047611c7dce2a5ec1b2d00
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   140758 470e18b3f9419e596c751faf241754b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   157284 a7fc472de134675a2a1a32450ba69ed6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   306084 63ef2a32a7524e50b159e763db24f20d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   210688 c9f497e57d482166c6d8a781bbb7d49c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   110776 50b8e557bc7be3d4073028dbefe88c1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   116648 00ad44a8b575eaccb1671d44d1021c2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1976268 32d6d6c5bd5825b5bdb69b71e3d57730
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  2350318 da80caab964bb8d0faf8901eaedd0125
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-headers-2.6.12-10-iseries-smp_2.6.12-10.32_powerpc.deb
      Size/MD5:   773126 b40189e84d90269d3552b890e18fedb5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc-smp_2.6.12-10.32_powerpc.deb
      Size/MD5:   782140 6ec521574da7f1b2a6829fd229ef5d98
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc64-smp_2.6.12-10.32_powerpc.deb
      Size/MD5:   800474 749d4337368ce487a4fc45e07786b73b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc_2.6.12-10.32_powerpc.deb
      Size/MD5:   782610 78a6b29c43ed70792d755bbf1f3443bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.32_powerpc.deb
      Size/MD5:  5934550 3f438c72413aa10d9525c7e8612ed32a
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-image-2.6.12-10-iseries-smp_2.6.12-10.32_powerpc.deb
      Size/MD5: 19519670 8fb96a42876cabc9254651f42912747b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc-smp_2.6.12-10.32_powerpc.deb
      Size/MD5: 18358530 1bfca927c7e5a023d26ead70ee418a91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc64-smp_2.6.12-10.32_powerpc.deb
      Size/MD5: 21185380 d41da9dc59cb332ae05469fdccc04829
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc_2.6.12-10.32_powerpc.deb
      Size/MD5: 18005522 2f2a25269383a4759a8ca97bc095b1de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.32_powerpc.deb
      Size/MD5:  3490682 0a4877353325cf3ce33389007b209399
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    17622 3be28d73eb78692e68effb6b031ce86c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    17788 bad3724a1489044a1ef67472f975c94c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   234112 1df122def0aedff336a149965a196ebb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   258864 63e7824904eeb909b36c6a5bb2506444
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   208850 60b9f65c296e26c0254cbe305bdeccd6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   235390 9f22a6d50220fed8b7548fd8f6d08d45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1048262 44a8a2f5b2e9db1d9a4ccbd6a4764df0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1048450 0cd2fe5e78e76645acad0ba7ae6cd296
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1458026 82174e0ef9142374b2152cacfa012e19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1622966 7eaca327fc9ed041c438ed3a868fd7e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   212814 da84848f1a000dbe13b86d6ad479c8ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   197956 3f7d128e38223dc10569e598b3b93a86
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     9464 0d4f9a9895a2484a2f31da5f92cb1ba1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     9058 cba9beeec58e1646654369585bb84cd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   115330 004f70f50920b6b3360f38373afd3b37
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   134444 cb22e79603779e9e2944670ce23d6f2b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    77024 97fdc809bb45ec888353d0d5703025b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    87528 1e792bf6010443a00b0446ebc000a595
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     4818 eb1f88c2bba42f617e67d3182f3a87e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:     5278 a471c77d1889cde8ac22b06a24ab709e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    63048 7dd25326635abfe1b0d1a6e76b457cde
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    75998 885c4b6c0f19d104fd7c0923262947ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   128624 341c03f1004c2d6f2b07e509e275fce2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   164354 ca2065bcb12ed7de81d7ba5929053a49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    77434 99a5f0af4ec2e85e2cd527c81c2eb614
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    98154 7566958e736f651ee1ba50041d3289b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    85246 bc19efedb748034bcfc5cdebbe31bb12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    92320 c977c2d5c007b5131de30c2ed05191e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1537900 bede87230459361c5ddf564ba0e4e8d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:  1755634 7e584e699dfac8f58b41e2a676b937c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    65292 ac172ce0f3e019a939af8c7ee8abccdc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   100430 9f2cc97cf6c02a60829880809fd55361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    22878 ebc05305ef51f033b2c9d28890027dcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    28602 e4a3ea1a04a3ab871ab6407d3826e370
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    35498 1c171b07d568b36988941d3d4a78fc40
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    39800 ac4d4374884d05838fceb150776b2c49
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   139886 e1a01e0d5e3a3c3348f175d715aa8d7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   152640 3f434bd827b9655f4d50ed45116ad6b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    40964 139d003d99faca8276fe32c5466ecd27
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:    44420 8e792edbd7bb0a376c818d95aa576c85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   296164 cc1b3c4445b81bf387768e465e93240e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.32_powerpc.udeb
      Size/MD5:   324184 381ba18b4a9c04ff1f25b9f1119b7e4a
    

- 漏洞信息

29841
Linux Kernel net/ipv4/netfilter/ IPv4 Socket Name Return Arbitrary Memory Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

The Linux kernel contains a flaw that may lead to local memory disclosure. The issue is due to net/ipv4/netfilter/ip_conntrack_core.c, net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c and net/ipv4/af_inet.c not properly clearing the 'sockaddr_in.sin_zero' struct. The resulting 6 byte leak to userspace occurs when returning IPv4 socket names from getsockopt(), getpeername(), accept() and getsockname() functions. This could allow a local attacker to possibly obtain sensitive information.

- 时间线

2006-03-04 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.6.18 or higher, as it has been reported to fix this vulnerability. In addition, Pavel Kankovsky has released a patch for some older versions.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站