CVE-2006-1528
CVSS4.9
发布时间 :2006-05-18 15:06:00
修订时间 :2016-10-17 23:39:32
NMCOPS    

[原文]Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space.


[CNNVD]Linux Kernel dio传输 拒绝服务漏洞(CNNVD-200605-334)

        Linux kernel 2.6.13之前版本可以使本地用户借助从sg驱动程序到内存映射(mmap) IO空间的dio传输,引起拒绝服务(崩溃)。

- CVSS (基础分值)

CVSS分值: 4.9 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.8.1.5::power4_smp
cpe:/o:linux:linux_kernel:2.6.0:test4Linux Kernel 2.6 test4
cpe:/o:linux:linux_kernel:2.6.0:test5Linux Kernel 2.6 test5
cpe:/o:linux:linux_kernel:2.6.0:test2Linux Kernel 2.6 test2
cpe:/o:linux:linux_kernel:2.6.0:test3Linux Kernel 2.6 test3
cpe:/o:linux:linux_kernel:2.6.8.1.5::686_smp
cpe:/o:linux:linux_kernel:2.6.0:test8Linux Kernel 2.6 test8
cpe:/o:linux:linux_kernel:2.6.0:test9Linux Kernel 2.6 test9
cpe:/o:linux:linux_kernel:2.6.10Linux Kernel 2.6.10
cpe:/o:linux:linux_kernel:2.6.0:test6Linux Kernel 2.6 test6
cpe:/o:linux:linux_kernel:2.6.8.1.5::386
cpe:/o:linux:linux_kernel:2.6.0:test7Linux Kernel 2.6 test7
cpe:/o:linux:linux_kernel:2.6.8.1.5::k7_smp
cpe:/o:linux:linux_kernel:2.6.11Linux Kernel 2.6.11
cpe:/o:linux:linux_kernel:2.6.12Linux Kernel 2.6.12
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8
cpe:/o:linux:linux_kernel:2.6.0:test11Linux Kernel 2.6 test11
cpe:/o:linux:linux_kernel:2.6.0:test1Linux Kernel 2.6 test1
cpe:/o:linux:linux_kernel:2.6.0:test10Linux Kernel 2.6 test10
cpe:/o:linux:linux_kernel:2.6.9:2.6.20
cpe:/o:linux:linux_kernel:2.6.8.1.5::686
cpe:/o:linux:linux_kernel:2.6.12.6Linux Kernel 2.6.12.6
cpe:/o:linux:linux_kernel:2.6.2:rc1Linux Kernel 2.6.2 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.3:rc2Linux Kernel 2.6.3 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.12.5Linux Kernel 2.6.12.5
cpe:/o:linux:linux_kernel:2.6.12:rc3Linux Kernel 2.6.12 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.2:rc2Linux Kernel 2.6.2 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.8Linux Kernel 2.6.8
cpe:/o:linux:linux_kernel:2.6.1:rc2Linux Kernel 2.6.1 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.2:rc3Linux Kernel 2.6.2 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.3:rc4Linux Kernel 2.6.3 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.3:rc1Linux Kernel 2.6.3 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.1:rc1Linux Kernel 2.6.1 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.3:rc3Linux Kernel 2.6.3 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12.4Linux Kernel 2.6.12.4
cpe:/o:linux:linux_kernel:2.6.1:rc3Linux Kernel 2.6.1 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12.3Linux Kernel 2.6.12.3
cpe:/o:linux:linux_kernel:2.6.12.2Linux Kernel 2.6.12.2
cpe:/o:linux:linux_kernel:2.6.8.1.5
cpe:/o:linux:linux_kernel:2.6.12.1Linux Kernel 2.6.12.1
cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc
cpe:/o:linux:linux_kernel:2.6.11_rc1_bk6
cpe:/o:linux:linux_kernel:2.6.6:rc1Linux Kernel 2.6.6 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.7:rc2Linux Kernel 2.6.7 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.6:rc2Linux Kernel 2.6.6 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.4:rc1Linux Kernel 2.6.4 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.5:rc2Linux Kernel 2.6.5 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.6:rc3Linux Kernel 2.6.6 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.4:rc2Linux Kernel 2.6.4 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.7:rc1Linux Kernel 2.6.7 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.4:rc3Linux Kernel 2.6.4 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.5:rc1Linux Kernel 2.6.5 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.7:rc3Linux Kernel 2.6.7 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.8:rc1Linux Kernel 2.6.8 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.9:rc2Linux Kernel 2.6.9 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.5:rc3Linux Kernel 2.6.5 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.8:rc2Linux Kernel 2.6.8 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.8:rc3Linux Kernel 2.6.8 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.9:rc4Linux Kernel 2.6.9 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.8:rc4Linux Kernel 2.6.8 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.9:rc1Linux Kernel 2.6.9 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.9:rc3Linux Kernel 2.6.9 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.10:rc2Linux Kernel 2.6.10 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.7Linux Kernel 2.6.7
cpe:/o:linux:linux_kernel:2.6.10:rc3Linux Kernel 2.6.10 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12:rc5Linux Kernel 2.6.12 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.6Linux Kernel 2.6.6
cpe:/o:linux:linux_kernel:2.6.11.12Linux Kernel 2.6.11.12
cpe:/o:linux:linux_kernel:2.6.11:rc5Linux Kernel 2.6.11 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.12:rc6Linux Kernel 2.6.12 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.10:rc1Linux Kernel 2.6.10 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11.11Linux Kernel 2.6.11.11
cpe:/o:linux:linux_kernel:2.6.11.10Linux Kernel 2.6.11.10
cpe:/o:linux:linux_kernel:2.6.11:rc3Linux Kernel 2.6.11 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.12:rc4Linux Kernel 2.6.12 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64
cpe:/o:linux:linux_kernel:2.6.11:rc4Linux Kernel 2.6.11 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.12:rc1Linux Kernel 2.6.12 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.11:rc1Linux Kernel 2.6.11 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.12:rc2Linux Kernel 2.6.12 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.5Linux Kernel 2.6.5
cpe:/o:linux:linux_kernel:2.6.11:rc2Linux Kernel 2.6.11 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.4Linux Kernel 2.6.4
cpe:/o:linux:linux_kernel:2.6.11.7Linux Kernel 2.6.11.7
cpe:/o:linux:linux_kernel:2.6.11.6Linux Kernel 2.6.11.6
cpe:/o:linux:linux_kernel:2.6.9:final
cpe:/o:linux:linux_kernel:2.6.11.5Linux Kernel 2.6.11.5
cpe:/o:linux:linux_kernel:2.6.11.4Linux Kernel 2.6.11.4
cpe:/o:linux:linux_kernel:2.6.11.9Linux Kernel 2.6.11.9
cpe:/o:linux:linux_kernel:2.6.11.8Linux Kernel 2.6.11.8
cpe:/o:linux:linux_kernel:2.6.11.3Linux Kernel 2.6.11.3
cpe:/o:linux:linux_kernel:2.6.11.2Linux Kernel 2.6.11.2
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_k8_smp
cpe:/o:linux:linux_kernel:2.6.11.1Linux Kernel 2.6.11.1
cpe:/o:linux:linux_kernel:2.6.3Linux Kernel 2.6.3
cpe:/o:linux:linux_kernel:2.6.2Linux Kernel 2.6.2
cpe:/o:linux:linux_kernel:2.6.8.1.5::power4
cpe:/o:linux:linux_kernel:2.6.8.1.5::power3
cpe:/o:linux:linux_kernel:2.6.8.1.5::amd64_xeon
cpe:/o:linux:linux_kernel:2.6.8.1.5::k7
cpe:/o:linux:linux_kernel:2.6.8.1.5::power3_smp
cpe:/o:linux:linux_kernel:2.6.8.1Linux Kernel 2.6.8.1
cpe:/o:linux:linux_kernel:2.6.11::x86_64
cpe:/o:linux:linux_kernel:2.6.8.1.5::powerpc_smp
cpe:/o:linux:linux_kernel:2.6_test9_cvs

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11037Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (m...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1528
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-334
(官方数据源) CNNVD

- 其它链接及资源

http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1
(UNKNOWN)  CONFIRM  http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1
http://linux.bkbits.net:8080/linux-2.6/cset@43220081yu9ClBQNuqSSnW_9amW7iQ
(UNKNOWN)  CONFIRM  http://linux.bkbits.net:8080/linux-2.6/cset@43220081yu9ClBQNuqSSnW_9amW7iQ
http://marc.info/?l=linux-scsi&m=112540053711489&w=2
(UNKNOWN)  MISC  http://marc.info/?l=linux-scsi&m=112540053711489&w=2
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://www.debian.org/security/2006/dsa-1183
(UNKNOWN)  DEBIAN  DSA-1183
http://www.debian.org/security/2006/dsa-1184
(UNKNOWN)  DEBIAN  DSA-1184
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
(UNKNOWN)  MANDRIVA  MDKSA-2006:123
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:042
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:047
http://www.redhat.com/support/errata/RHSA-2006-0493.html
(UNKNOWN)  REDHAT  RHSA-2006:0493
http://www.securityfocus.com/bid/18101
(UNKNOWN)  BID  18101
http://www.ubuntu.com/usn/usn-302-1
(UNKNOWN)  UBUNTU  USN-302-1
http://www.vupen.com/english/advisories/2006/3330
(UNKNOWN)  VUPEN  ADV-2006-3330
http://xforce.iss.net/xforce/xfdb/28510
(UNKNOWN)  XF  kernel-sg-dos(28510)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168791
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168791

- 漏洞信息

Linux Kernel dio传输 拒绝服务漏洞
中危 设计错误
2006-05-18 00:00:00 2006-05-22 00:00:00
本地  
        Linux kernel 2.6.13之前版本可以使本地用户借助从sg驱动程序到内存映射(mmap) IO空间的dio传输,引起拒绝服务(崩溃)。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        S.u.S.E. Linux Professional 10.1
        SuSE apparmor-admin_en-10-7.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-1 0-7.5.noarch.rpm
        SuSE apparmor-docs-2.0-17.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-1 7.5.noarch.rpm
        SuSE apparmor-profiles-2.0-34.9.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2 .0-34.9.noarch.rpm
        SuSE apparmor-utils-2.0-23.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0- 23.5.noarch.rpm
        SuSE yast2-apparmor-2.0-27.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0- 27.5.noarch.rpm
        Linux kernel 2.4 .0-test3
        Linux linux-2.4.33.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.4/linux-2.4.33.1.tar.bz2
        Linux kernel 2.4 .0-test7
        Linux linux-2.4.33.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.4/linux-2.4.33.1.tar.bz2
        Linux kernel 2.4
        Linux linux-2.4.33.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.4/linux-2.4.33.1.tar.bz2
        Linux kernel 2.4 .0-test11
        Linux linux-2.4.33.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.4/linux-2.4.33.1.tar.bz2
        Linux kernel 2.4 .0-test4
        Linux linux-2.4.33.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.4/linux-2.4.33.1.tar.bz2
        Linux kernel 2.4 .0-test1
        Linux linux-2.4.33.1.tar.bz2
        http://kernel.org/pub/linux/kernel/v2.4/linux-2.4.33.1.tar.bz2
        

- 漏洞信息 (F48636)

SUSE-SA-2006-042.txt (PacketStormID:F48636)
2006-07-28 00:00:00
 
advisory,kernel,vulnerability
linux,suse
CVE-2006-0744,CVE-2006-1528,CVE-2006-1855,CVE-2006-1857,CVE-2006-1858,CVE-2006-1859,CVE-2006-1860,CVE-2006-2444,CVE-2006-2445,CVE-2006-2448,CVE-2006-2450,CVE-2006-2451,CVE-2006-2934,CVE-2006-2935,CVE-2006-3085,CVE-2006-3626
[点击下载]

SUSE Security Announcement SUSE-SA:2006:042 - A slew of kernel related vulnerabilities has been fixed in SUSE Linux for the 2.6 series.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:042
        Date:                   Wed, 26 Jul 2006 14:00:00 +0000
        Affected Products:      SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
        Vulnerability Type:     local privilege escalation
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2006-0744, CVE-2006-1528, CVE-2006-1855
                                CVE-2006-1857, CVE-2006-1858, CVE-2006-1859
                                CVE-2006-1860, CVE-2006-2444, CVE-2006-2445
                                CVE-2006-2448, CVE-2006-2450, CVE-2006-2451
                                CVE-2006-2934, CVE-2006-2935, CVE-2006-3085
                                CVE-2006-3626

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             Various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The Linux kernel has been updated to fix several security issues.

   This advisory refers to kernel updates for SUSE Linux 9.1 - 10.1.

   For the SUSE Linux Enterprise 9 and 10, Novell Linux Desktop 9, Open
   Enterprise Server products the kernel update is still in testing and
   will be released within the next week.

   SUSE Linux Enterprise 8 and SUSE Linux Desktop 1 with Linux 2.4 based
   kernels are not affected by exploitable problems in their default
   configuration and will not be updated with this security update round.

   The SUSE Linux 10.1 kernel has been updated to state of the SUSE
   Linux Enterprise 10 kernel and will continue to track it.
   The updated kernel enables convenient use of kernel module packages
   for NVIDIA and ATI drivers on SUSE Linux 10.1.
   Please see the HOWTOs on http://opensuse.org/ on how to add and use
   them. The update also includes a set of AppArmor and Kernel Module
   Package (KMP) updates.

   Following security issues fixed:
   - CVE-2006-0744: When the user could have changed %RIP always force IRET,
                    now also fixed for the UML kernel.

   - CVE-2006-1859: A memory leak in __setlease in fs/locks.c allows
                    local attackers to cause a denial of service (memory
                    consumption) via unspecified actions related to an
                    "uninitialized return value," aka "slab leak."

   - CVE-2006-1860: lease_init in fs/locks.c allows local attackers to cause a
                    denial of service (fcntl_setlease lockup) via actions
                    that cause lease_init to free a lock that might not
                    have been allocated on the stack.

   - CVE-2006-1528: Linux allows local users to cause a denial of service (crash)
                    via a Direct I/O transfer from the sg driver to memory
                    mapped (mmap) IO space.

   - CVE-2006-1855: It was possible to potentially crash the kernel by
                    using CPU timers and timing the termination of the
                    parent process.

   - CVE-2006-1857: A buffer overflow in the SCTP protocol could allow remote
                    attackers to cause a crash or possibly execute arbitrary
                    code via a malformed HB-ACK chunk.

   - CVE-2006-1858: SCTP allowed remote attackers to cause a denial of service
                    (crash) and possibly execute arbitrary code via a chunk
                    length that is inconsistent with the actual length of
                    provided parameters.

   - CVE-2006-2444: The snmp_trap_decode function in the SNMP NAT helper
                    allows remote attackers to cause a denial of service
                    (crash) via unspecified remote attack vectors that cause
                    failures in snmp_trap_decode that trigger (1) frees of
                    random memory or (2) frees of previously-freed memory
                    (double-free) by snmp_trap_decode as well as its calling
                    function, as demonstrated via certain test cases of
                    the PROTOS SNMP test suite.

   - CVE-2006-2445: A race condition in run_posix_cpu_timers allows local
                    users to cause a denial of service (BUG_ON crash)
                    by causing one CPU to attach a timer to a process that
                    is exiting.

   - CVE-2006-2448: Due to missing checking of validity of user space pointers
                    it was possible for local attackers to read any kernel
                    memory, potentially exposing sensitive data to the
                    attacker or crash the kernel.
                    This problem is PowerPC specific.

   - CVE-2006-3085: Fixed a remotely trigger able endless loop in SCTP netfilter
                    handling caused by 0 chunk length.

   - CVE-2006-2451: Due to an argument validation error in prctl(PR_SET_DUMPABLE)
                    a local attacker can easily gain administrator (root)
                    privileges.

   - CVE-2006-2934: When a SCTP packet without any chunks is received, the
                    newconntrack variable in sctp_packet contains an out of
                    bounds value that is used to look up an pointer from the
                    array of timeouts, which is then dereferenced, resulting
                    in a crash. Make sure at least a single chunk is present.

   - CVE-2006-2935: A stack based buffer overflow in CDROM / DVD handling was
                    fixed which could be used by a physical local attacker
                    to crash the kernel or execute code within kernel
                    context, depending on presence of automatic DVD handling
                    in the system.

   - CVE-2006-3626: A race condition allows local users to gain root
                    privileges by changing the file mode of /proc/self/
                    files in a way that causes those files (for instance
                    /proc/self/environ) to become setuid root.

    The SUSE Linux 9.1 kernel update is the final SUSE Linux 9.1 YOU
    update (see separate announcement from some days ago).

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes


     SPECIAL INSTALLATION INSTRUCTIONS
     =================================
     The following paragraphs guide you through the installation
     process in a step-by-step fashion. The character sequence "****"
     marks the beginning of a new paragraph. In some cases, the steps
     outlined in a particular paragraph may or may not be applicable
     to your situation. Therefore, make sure that you read through
     all of the steps below before attempting any of these
     procedures. All of the commands that need to be executed must be
     run as the superuser 'root'. Each step relies on the steps
     before it to complete successfully.


   **** Step 1: Determine the needed kernel type.

     Use the following command to determine which kind of kernel is
     installed on your system:

       rpm -qf --qf '%{name}\n' /boot/vmlinuz


   **** Step 2: Download the packages for your system.

     Download the kernel RPM package for your distribution with the
     name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
     modules that are not free were moved to a separate package with
     the suffix '-nongpl' in its name. Download that package as well
     if you rely on hardware that requires non-free drivers, such as
     some ISDN adapters. The list of all kernel RPM packages is
     appended below.

     The kernel-source package does not contain a binary kernel in
     bootable form. Instead, it contains the sources that correspond
     with the binary kernel RPM packages. This package is required to
     build third party add-on modules.


   **** Step 3: Verify authenticity of the packages.

     Verify the authenticity of the kernel RPM package using the
     methods as listed in Section 6 of this SUSE Security
     Announcement.


   **** Step 4: Installing your kernel rpm package.

     Install the rpm package that you have downloaded in Step 2 with
     the command

         rpm -Uhv <FILE>

     replacing <FILE> with the filename of the RPM package
     downloaded.

     Warning: After performing this step, your system may not boot
              unless the following steps have been followed
   	     completely.


   **** Step 5: Configuring and creating the initrd.

     The initrd is a RAM disk that is loaded into the memory of your
     system together with the kernel boot image by the boot loader.
     The kernel uses the content of this RAM disk to execute commands
     that must be run before the kernel can mount its root file
     system. The initrd is typically used to load hard disk
     controller drivers and file system modules. The variable
     INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
     modules are loaded in the initrd.

     After a new kernel rpm has been installed, the initrd must be
     recreated to include the updated kernel modules. Usually this
     happens automatically when installing the kernel rpm. If
     creating the initrd fails for some reason, manually run the
     command

       /sbin/mkinitrd


   **** Step 6: Update the boot loader, if necessary.

     Depending on your software configuration, you either have the
     LILO or GRUB boot loader installed and initialized on your
     system. Use the command

       grep LOADER_TYPE /etc/sysconfig/bootloader

     to find out which boot loader is configured.

     The GRUB boot loader does not require any further action after a
     new kernel has been installed. You may proceed to the next step
     if you are using GRUB.

     If you use the LILO boot loader, lilo must be run to
     reinitialize the boot sector of the hard disk. Usually this
     happens automatically when installing the kernel RPM. In case
     this step fails, run the command

       /sbin/lilo


     Warning: An improperly installed boot loader will render your
              system unbootable.


   **** Step 7: Reboot.

     If all of the steps above have been successfully completed on
     your system, the new kernel including the kernel modules and the
     initrd are ready to boot. The system needs to be rebooted for
     the changes to be active. Make sure that all steps have been
     completed then reboot using the command

       /sbin/shutdown -r now

     Your system will now shut down and restart with the new kernel.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv <file.rpm>

   to apply the update, replacing <file.rpm> with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/apparmor-parser-2.0-21.5.i586.rpm
          9cd9a522ee1844e945b580697cf23ad9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-1.1.3-23.3.i586.rpm
          89d2201c3dbc746ec24cf4bd4cb44559
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-devel-1.1.3-23.3.i586.rpm
          72540e4f65fd2edf1782a75114fccb9f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-libs-1.1.3-23.3.i586.rpm
          4cf153c5f2f544d0766a00fa83b3c8ef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-bigsmp-2.01_2.6.16.21_0.13-22.3.i586.rpm
          6bdf25dbf6a23a529fcb03a64b17cebf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.i586.rpm
          a844ad701dd378b34a4cadc0e4c22e6f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.i586.rpm
          dff4d32521e85e17d4f8ff6adca93949
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.i586.rpm
          cef9a15763ee6932c53ee21473cd4997
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.i586.rpm
          ba16f758468d56f1d7923db3b0904631
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-xenpae-2.01_2.6.16.21_0.13-22.3.i586.rpm
          2c43fb6f07d4bfe9b93870e5427c1895
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-0.7.18-3.3.i586.rpm
          e7b20cfae135aa61d35b7a5b21c74330
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-bigsmp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          909215493b300108c63119ab9f096d79
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          e113b1b042ae80eab80c23c4c28cf97f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          b69e5fc59ca5d0c240fd53fc98a5484a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          6c9bac44ad763009d4331401d3ac10ec
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          3188da9046488df7bed609ffd7ce54fe
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-xenpae-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          bb3ef37bcb236e56be33e14e1e367983
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-bigsmp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          b9ecda8924b39c2ef58543daeb27f35f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          410388ef1c72ff622aa163a5c2d9df4c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          afb6655fed055160232e9e88da940b24
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          23bab134a07330c207e7318843c82a79
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          4797651065a56662beb54b0a6bc88b12
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-xenpae-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          77832a824919e683087693f24db509f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-bigsmp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          57aefc602afcb1d96e386a748c84077f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          641354f8153682d9657809ff3de2ceef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          32c3dd5b3aa99ba22851a5b8437c3198
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          261b6e2cef8380c105f1175813b6652e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          2b0a21a904508d395e3fb6ae250bb97d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-xenpae-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          bdb122fa51617514703c0e6655976ecb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-bigsmp-2.6.16.21-0.13.i586.rpm
          a7cd535abc7d7369df33218549a40641
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-debug-2.6.16.21-0.13.i586.rpm
          76afdaa38402761b7a4547d346128d12
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-default-2.6.16.21-0.13.i586.rpm
          c02ef80cf6259e9c2e2367d906ddbce5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-kdump-2.6.16.21-0.13.i586.rpm
          7d2ae84459eb40f27eb27ccd17f40065
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-smp-2.6.16.21-0.13.i586.rpm
          bb548b149f045f71f0cc77cdeab3554e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-source-2.6.16.21-0.13.i586.rpm
          06f6819e6b542f818dfc1cf8b177d21c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-syms-2.6.16.21-0.13.i586.rpm
          c03b63fe79c14b963c2ca952d741507b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-um-2.6.16.21-0.13.i586.rpm
          47dfc55b417521fc8f89719a26590b8b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xen-2.6.16.21-0.13.i586.rpm
          ce2c2a0c3d8f8de549f7f9e464b215c6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xenpae-2.6.16.21-0.13.i586.rpm
          0ebf3e42683ade314e2eb216ee11de72
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kexec-tools-1.101-32.17.i586.rpm
          28f60804adcf7e5d19ec52b4d64de043
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-bigsmp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          67b4f753cc31f80de61e6c3b46511ad8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          fe279b89071ac503553a3ef9f7006ccb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          b051b17aaa7f5f3faddd7ae04e17b25b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-xenpae-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          91e65fa9b282efc42f012b27f55db16c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/mkinitrd-1.2-106.15.i586.rpm
          3f795b29fdf6a9bc66eb42c8686c7977
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/multipath-tools-0.4.6-25.9.i586.rpm
          d8dafe24a0f64529fa92a7f21acd88dd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-bigsmp-1.10_2.6.16.21_0.13-19.3.i586.rpm
          e5a0788af9f6f93be7592212fa4e1d4f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.i586.rpm
          188cdc73cf94c84cef6d9bfec587da9d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.i586.rpm
          9b8abac21a6ed044bdde306d27f97b03
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.i586.rpm
          2865814e726de3c07e4a63433e2408ae
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.i586.rpm
          d49abd0a6bd8319a6bf35665cb20e1f1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-xenpae-1.10_2.6.16.21_0.13-19.3.i586.rpm
          38bbad45bd3915010d26dd7dbf07b570
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-bigsmp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          a20595f9f88f23363aea1e281a853bb9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          e266f1647fd1d9b3fe53782249aa8017
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          21c7664b863b822b7e6fca494167dca7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          206c4c2c37edbe12a532d7df17992fe5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          74f8ee6ce6fb0ba4264027d82dedfed2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-xenpae-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          684fe3618c802c5949c16c2e23490fa7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-bigsmp-20060126_2.6.16.21_0.13-3.1.i586.rpm
          aa274c0190792577dae5400fecad7642
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.i586.rpm
          b37e5f6d1afff4d17236e781e908c4a2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.i586.rpm
          504aee4caf372688dd59254b4296a071
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.i586.rpm
          826ef0e62b77ee7db3515c4f81d918fb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.i586.rpm
          ba37438f88bb172e407d6e4db00fab9a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.i586.rpm
          3976e689381649ba359466ba5f891322
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-xenpae-20060126_2.6.16.21_0.13-3.1.i586.rpm
          cb6ef7570da4621c6db5c23bbe9e382e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/open-iscsi-0.5.545-9.13.i586.rpm
          99aa6db3390acb91b9c67ac251c2ffc3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/openafs-kmp-xenpae-1.4.0_2.6.16.21_0.13-21.1.i586.rpm
          a56246ac270979f33de6dff3aa6b9d43
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-bigsmp-0.44_2.6.16.21_0.13-15.1.i586.rpm
          afa731bcb72c96c2e3554518143a2941
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.i586.rpm
          8479ea66ef737620144bfa24d5793005
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.i586.rpm
          702881557801a075ae91c8662556181d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.i586.rpm
          fc4dfe6ba9c75dacbd9f4cf5f3b4dfbd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.i586.rpm
          82ace92edf245eceddd502b65632b4af
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-bigsmp-4.17_2.6.16.21_0.13-30.3.i586.rpm
          26815c7856a9b3e2912bba2e10baac34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-debug-4.17_2.6.16.21_0.13-30.3.i586.rpm
          be232e269a6067bd2d936f16e6c8a3a6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-default-4.17_2.6.16.21_0.13-30.3.i586.rpm
          c4c56fbf67434f5f2939dd4e85cf6108
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-smp-4.17_2.6.16.21_0.13-30.3.i586.rpm
          90fda039097bcb9dfea77c93321895e4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/udev-085-30.11.i586.rpm
          73a5ffcaeea72c89632f6597113fa435
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-bigsmp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          749b7ec34a2cd0864cd296419bdafcd8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-debug-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          a0eb6f7674520a01b151c490dc342dc7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-default-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          37a4e14ce1ec4965f26e1326d7241762
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-smp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          5c9926a62a9e5096ce63349acbe89724
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-xen-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          d2410737db46df9bada726bfc2416a2c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-xenpae-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          694c781f29dccaa1f26fcd58c79d4371
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-bigsmp-1_2.6.16.21_0.13-12.6.i586.rpm
          01f91c7bd6eb1ca1edf5bee04ea2786a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-debug-1_2.6.16.21_0.13-12.6.i586.rpm
          5a1adb87796cc4dc05dd38ff285e3408
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-default-1_2.6.16.21_0.13-12.6.i586.rpm
          38786dc33bfa6f02d3aa1bf997d25398
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-smp-1_2.6.16.21_0.13-12.6.i586.rpm
          0b4cbdb97296ee00c6a67179f4b4efb7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-xen-1_2.6.16.21_0.13-12.6.i586.rpm
          f139106bdfbc3e4faf1f4bad2a5f326b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-xenpae-1_2.6.16.21_0.13-12.6.i586.rpm
          14ed4ae45d2d65ad5c78581940bb353a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-3.0.2_09749-0.7.i586.rpm
          59d56377f67d382fa5adca980a21caa8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-devel-3.0.2_09749-0.7.i586.rpm
          2b7d4f9881b452a48abff40cf56241f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-html-3.0.2_09749-0.7.i586.rpm
          59363777b0f98db4f96722fc95752866
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-pdf-3.0.2_09749-0.7.i586.rpm
          0fa70e52865138e9644a24c036e3bda2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-ps-3.0.2_09749-0.7.i586.rpm
          ad5649957c67a8ecf5fae796fb7e40db
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-libs-3.0.2_09749-0.7.i586.rpm
          e2c1e535725b5b24cd19c51a0e8dc8f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-tools-3.0.2_09749-0.7.i586.rpm
          0cadd80f58357b3135825cba81785b56
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-tools-ioemu-3.0.2_09749-0.7.i586.rpm
          8387b6d495aa45270872f60aabc1c394
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-bigsmp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          f7b74bcb292788f9cc5c584a01a9a47b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          42a59aacc105356cfa1565cad548fd88
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          d4c16bdda9973cec6f66b6cb6216e7d1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          042d4daa42d5941ed5efce7d10c72c25
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          cd8d8148c21c5acb1739ba3467dfe119
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-xenpae-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          d4b664e27c6c8ec2eb4154d73b498171

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.6.i586.rpm
          f1a8ba80079b81685d9426f09b64bb99
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.11.i586.rpm
          d2390ddccfaad103ae4d80fb59a73800
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.11.i586.rpm
          f45d3b6f92c7e07be02ac7c45d6d2420
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.11.i586.rpm
          d5ddb4d7c4e729712abd31c16d1d00fb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.11.i586.rpm
          5354e1fa6372548bb998eacbb438fc9d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.11.i586.rpm
          f358de08699bfbd90c2a96b63d04ebe9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.11.i586.rpm
          002fde4bfccb45b7b928f2d6cb175702
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.11.i586.rpm
          8dcc7463d139b67f4058196077fd77bb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.11.i586.rpm
          82ef2c427e48d71d088bccdd3090051d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.11.i586.rpm
          4cada92e8b362a18a6cb2e7b9dad1867
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.11.i586.rpm
          a5c1fb1d7ba62cb7d47e1ebc68b6043b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.11.i586.rpm
          e2e53924d3dd90ae1ed6fd6cf65e5a98
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.11.i586.rpm
          cd9bad0b01cdad5dc70d4fbc82352af0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.11.i586.rpm
          d0af6de05ca9a572cf9ea25ba702867c

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.7.i586.rpm
          fb640315cdcf43f2ffd7f6f51828eccc
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.13.i586.rpm
          474bcbd50739da47319f62ea9efac697
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.13.i586.rpm
          f591a96ebe1788fa7503ed80b35f4b9b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.13.i586.rpm
          00c44c19362f6256a95496de93500524
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.13.i586.rpm
          cc6aebefa35a4bca90cc22cf4522fe97
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.13.i586.rpm
          00dfc63513b64f9aa6534ee0424a4d42
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.13.i586.rpm
          cfab4802ff6cdb522494690a53166bbe
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.13.i586.rpm
          a8b6221034411bf63093fa7c2b8e6ad4
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.13.i586.rpm
          267669734dc0e95e2bdf96a4c9ce5321
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.13.i586.rpm
          31d0831adab64bbf848433c2b0b68db8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.13.i586.rpm
          751dad14c0578d2522cad557ad00f13f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.13.i586.rpm
          32523934ffd726b303cd7650168262f2
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.13.i586.rpm
          5155c42795497c07f27093677b011d2c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.7.i586.rpm
          23bb3edd5eccdbfdba9abcfb1c356a7c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.7.i586.rpm
          7e0d874eacfb71671ef2cce0287f8cb0
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.13.i586.rpm
          7e561721fad94a6d744864bce5dd551e

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.16.i586.rpm
          bb0396417107d32fed4997d7a70b37f9
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.24.i586.rpm
          bde42b68a6ed0eb3c3633ceb125f348c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.24.i586.rpm
          ef4c6540b77fa646649fdc473039a569
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.24.i586.rpm
          740f4bb7cbb56cf55360bf4a1edf32fe
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.24.i586.rpm
          19313402b487108c4ef883dfcb7aa03e
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.24.i586.rpm
          4acac5fcacfb83abe2326c880a9ab94b
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.24.i586.rpm
          d5649a51a381106a7733bfe093c71bc4
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.24.i586.rpm
          0415a737781d2906b3d380ccf3946dc7
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.24.i586.rpm
          5bf912e55bb0fb5aec445eafa0075784
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.24.i586.rpm
          f56fe753c10797532e7239b9a68e97d6
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.24.i586.rpm
          a2f9dbcacff96e556ff82cc716417ed5
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.16.i586.rpm
          5a062eb816a7a4638f9261ba98767dd2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.15.i586.rpm
          9e31db031ba57f3af146a17d9597986f
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.24.i586.rpm
          0f9837aa3de9897a5983af8726615339

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.276.i586.rpm
          ceba69d6952612d1cc2434b8da1cbf75
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.276.i586.rpm
          1c1d3680df647755a922fbf8028b58b9
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.276.i586.rpm
          217d25d2d474d4f7eb974d966fd4c926
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.276.i586.rpm
          aabe3bb797ddaacc5f19b144d37b4be5
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.276.i586.rpm
          d87358add6318890f66d0de62a2bcbea
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.24.i586.rpm
          d8eadd159248361b0a9ee0e0cb3f4168

   Platform Independent:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-10-7.5.noarch.rpm
          8a183fb7f7b69af041e1f6f4a5b46d68
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-17.5.noarch.rpm
          827b675a6c216ec32902183c79433479
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2.0-34.9.noarch.rpm
          f6ae693557732b8f27eba4dfde4a9eb4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0-23.5.noarch.rpm
          acb673a77bfe60d6d036e60f5b19764b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0-27.5.noarch.rpm
          83c76ee5e56846ec7545d5fe0bf25098

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.13.noarch.rpm
          1ebb82bcf1316493ca8b4355db932d0b

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.24.noarch.rpm
          e7d6caf8cb9c23119d181b98efaf7ba7

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.276.noarch.rpm
          ece4fe625855902c637abe9f1252f6d4
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.276.noarch.rpm
          556b8059e67605daa9d789907db10778

   Power PC Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/apparmor-parser-2.0-21.5.ppc.rpm
          f630cd2887055b6442706a229bd79f34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-1.1.3-23.3.ppc.rpm
          8aa6cc2de24e4bb4d4c74307986ca354
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-devel-1.1.3-23.3.ppc.rpm
          f7e3b65e5754df2c7e3f81387f4dfce5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-libs-1.1.3-23.3.ppc.rpm
          5c6861388a938b80c266a1932fac85d0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          ac3295455812a021ad5f239ab56287cb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-iseries64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          8dd405813e14d317831dc5b6a657d55d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-ppc64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          c59982049da9a11ebf26e3ac477442ab
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-0.7.18-3.3.ppc.rpm
          fdcc271b40cfc14985951fb94154c0ef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          16e8bf1e04d4574ea116fd8a9617c5ed
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-iseries64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          0e648065b5442763404396603e1c2782
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-ppc64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          a7dcee57666e9ca61d4dea5b4953655b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-default-2.6.16.21-0.13.ppc.rpm
          e37ef749e89e0785dee5cb0bb1efa740
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-iseries64-2.6.16.21-0.13.ppc.rpm
          1623a8a97419a2272027aa166430860a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-kdump-2.6.16.21-0.13.ppc.rpm
          76c9fdf080d3697ba2b97a18b3c031f8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-ppc64-2.6.16.21-0.13.ppc.rpm
          181a7668969c02dd217f77f795f88214
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-source-2.6.16.21-0.13.ppc.rpm
          216d42cb7f22a423bb62b1af3124ca5a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-syms-2.6.16.21-0.13.ppc.rpm
          2442412bc80a1301b3cf4a8e491e1a1d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          583928fdc71ae4a8790bc1d04be092d0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-iseries64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          0c617c35763488383d31e09776981ffc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-ppc64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          b64cd82811dc7d7f279b87e5dbc51276
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/mkinitrd-1.2-106.15.ppc.rpm
          70ca7ada636755d8ba1d159d38cfb98c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/multipath-tools-0.4.6-25.9.ppc.rpm
          0df9787c0d34cdde227e76218accbafb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/open-iscsi-0.5.545-9.13.ppc.rpm
          8b19b4b4d10841fc0edcfad8bead5321
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.ppc.rpm
          108d8f2c2b660bfd805ef76820a8a835
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcfclock-kmp-ppc64-0.44_2.6.16.21_0.13-15.1.ppc.rpm
          0dab492bad5d5815c678df2987ebae62
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.ppc.rpm
          61cd65508674e71fe619bec2fb9026f3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/udev-085-30.11.ppc.rpm
          4571532a54b7e221448b324ca994e4d1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-default-1_2.6.16.21_0.13-12.6.ppc.rpm
          079bb0db9f9396f5daf64cb00246bbd1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-iseries64-1_2.6.16.21_0.13-12.6.ppc.rpm
          835067ccf55f42ed34cff08e9b6ffce4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-ppc64-1_2.6.16.21_0.13-12.6.ppc.rpm
          3bd1bb0e1150dc95f94858e956f4dc22
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.ppc.rpm
          068e5337926200f980be3dcb67c2eb98

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.11.ppc.rpm
          8351be43b5c3896df83c63ba65cfeb5a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.11.ppc.rpm
          7747fa43d835b3320b3a3fa54f235013
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.11.ppc.rpm
          18c443c60f7829c88bd821fb865046ac
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.11.ppc.rpm
          06cf812b56183eb5156e344db7fe310c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.11.ppc.rpm
          2f44c721c158dd9f56a497223b54431d

   x86-64 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/apparmor-parser-2.0-21.5.x86_64.rpm
          060873e93856d7954d33812f2cb26c13
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-1.1.3-23.3.x86_64.rpm
          a3149bc43d13af6a808efce907f11b53
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-devel-1.1.3-23.3.x86_64.rpm
          48d28c73627c036e60fbcba5daa889ff
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-libs-1.1.3-23.3.x86_64.rpm
          dee93d43a783ebf6ca16202a1382118f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          dc2bb193b8f30b6d3444aa9371826d23
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          df81804f31015ce6baf0eec3354a75b9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          a9f20351762bccc74ebc1df2d5b5adf4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          1013121fc139ace267bb33f3b10e114d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-0.7.18-3.3.x86_64.rpm
          44025e09c1571e735f82d4d60e71fc0b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          3331bff87496d9e9afa1fb83919b1111
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          2b85c2e78d4ecb2e0e21f7908c7257f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          bd3e07b7356c64b541be792c97868d19
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          35ee253010ade83dc595c8a27f308335
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          d845a7df15fdb571df85b31e6a667005
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          a3f8918d10b82a61042f3044a695e877
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          82f20f84b58d676999e5e909336c66b7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          c5584a0cbbc8d0fef477afe195dcf277
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          fe4d8f6e1297c41dd04b1dc6473d47c1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          1a03723657be633a35162e31940ae647
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          66875b4b65f2e48df27491a2d0d93de9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          0e8f15d78033b73a96440736820e5cbb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-debug-2.6.16.21-0.13.x86_64.rpm
          d237873002ea1a5501f3b61f76b6903c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-default-2.6.16.21-0.13.x86_64.rpm
          f44e5a424121b256b3c1287997ba4061
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-kdump-2.6.16.21-0.13.x86_64.rpm
          170baeb8f839651598ddbcbf93aa4670
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-smp-2.6.16.21-0.13.x86_64.rpm
          d32a01850aebf660e1a740c2f9b9927a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-source-2.6.16.21-0.13.x86_64.rpm
          8002fc7b644f2c64c258400f29050e5d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-syms-2.6.16.21-0.13.x86_64.rpm
          9c7549f01707a434c0247f73eb9b0152
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-xen-2.6.16.21-0.13.x86_64.rpm
          9ecef38e308f2e4ef644e832fee15a8b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kexec-tools-1.101-32.17.x86_64.rpm
          121b57cabdcb74e90f3992ad2a7843c8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
          84ef08317d3bcf6552ec57a0487349e0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
          64898d1f8f8e98ab43f2d52a10bd3a52
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/mkinitrd-1.2-106.15.x86_64.rpm
          49bee58e184fe82330f0b9c1720a97f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/multipath-tools-0.4.6-25.9.x86_64.rpm
          e01336dc8e630ffa76918c4e487dba9f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          fe54b39f60d50c48f25d9e756212991e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          2906ea2b8c781eda354a83bcd668ea10
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          16ee21b17dcd1e5c3db212d9b9f281ba
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          59f733077e5cf2d208802599111778b1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          6bce5050ab3d11597c129b2a86a22599
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          b033fe6ec282491fc8227718a2ccddb3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          e0a234ff6261e1b3d28afcfb1b09cb52
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          e262ada6e83e80b394f84deb18d367c7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          1ba9eece36909166f129f3a05c5b0a34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          0c61295b0a053475f6a31619f761d67d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          28c2c42e81b473b533800c26fb161db8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          b490a216fad445f0499dabb64307de75
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          f72df7eddb5a3f417878e5680fab5cd1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/open-iscsi-0.5.545-9.13.x86_64.rpm
          c51104356caeb53cd189079bfc8f7bb4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          5487af5844e98b6a3d51394671d19fd5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          5547a66c2172a1e37cf83352a2971bf7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          fbd677b5ef2747de9f038efb55ff5162
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.x86_64.rpm
          01f40956b13ece3ffac89484d99784f1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/udev-085-30.11.x86_64.rpm
          149b04dbd960e9c853578c5357ce142d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-debug-1_2.6.16.21_0.13-12.6.x86_64.rpm
          3356f6a1d58c98344b354fc556a7ed32
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-default-1_2.6.16.21_0.13-12.6.x86_64.rpm
          3fcf84553e3039c1ad1659681fa59c4f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-smp-1_2.6.16.21_0.13-12.6.x86_64.rpm
          c9c8d7587bd5922fb0d87d066f402d72
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-xen-1_2.6.16.21_0.13-12.6.x86_64.rpm
          dffd5eab1d7e201b8802b96bd5b39030
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-3.0.2_09749-0.7.x86_64.rpm
          8f08be21026a337d1331288d0ed33192
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-devel-3.0.2_09749-0.7.x86_64.rpm
          9e9806f40e6ab9961543306d1ee236cf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-html-3.0.2_09749-0.7.x86_64.rpm
          7ef2bf1b781916f5a778804380ad921b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-pdf-3.0.2_09749-0.7.x86_64.rpm
          04e9674d20bbbf8785b5cfcc2131e7da
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-ps-3.0.2_09749-0.7.x86_64.rpm
          a0b1277b24d9c2c0a46557bb6f4e4473
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-libs-3.0.2_09749-0.7.x86_64.rpm
          b5eb3c8eb334d8f09bce0ec67d9e9ca7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-libs-32bit-3.0.2_09749-0.7.x86_64.rpm
          9955c0c24e174ec83f46ce52e76ab98e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-tools-3.0.2_09749-0.7.x86_64.rpm
          523ccc5bee4cfdbb9b1b7080f9a05649
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-tools-ioemu-3.0.2_09749-0.7.x86_64.rpm
          08159c0dd7ea459396d5de547e75d7f0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          b2499ba0ba2367da270f690b75ee40c8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          45d781cffb80f6d8bd5d58be522aa2f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          7ad169812c058a21be7b49fd86fd9237
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          f9c0361874d265be3e6e2e8ef66ae635

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.11.x86_64.rpm
          b85489f0ad8cc9bbb5728c64e7c8fc2f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.11.x86_64.rpm
          4e132e7adbada352e112c64a3c9f2408
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.11.x86_64.rpm
          087fea22e9d90ef98337c30f55318db3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.11.x86_64.rpm
          e6f47d4bd1fda55cabf5a59b62c2e183
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.11.x86_64.rpm
          0a6f8350214710e2f600ac204eb1a0a5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.11.x86_64.rpm
          5fff86f3834368fa34c5e32855f44d0c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.11.x86_64.rpm
          f87081d87e0f9c7d3ba627309107bddf
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.11.x86_64.rpm
          b8d9b58c238d533550ccce278dad30f0

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.13.x86_64.rpm
          43f6fb67727c88b0f4aeda733120ac84
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.13.x86_64.rpm
          bf333ee5088cc7f5a4888530557fb719
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.13.x86_64.rpm
          be4142bb00d29a20b18159add573fc74
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.13.x86_64.rpm
          8c47ed2a4949b3e9aaa046830472b2ef
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.13.x86_64.rpm
          1d373c25c0590d223f17e1d9feba1f6c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.13.x86_64.rpm
          f21817e9293fc603914958b0eed983ca

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.24.x86_64.rpm
          c4d600c67fa16520e30e4f306c2f174c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.24.x86_64.rpm
          1e5a69fdd455ba1c9317b5386b4f887d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.24.x86_64.rpm
          37a138694706fdd8229d51f75256ca74
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.24.x86_64.rpm
          9ede22ac6b4119995d4c8ea6329f2851
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.24.x86_64.rpm
          9c28c19a989ad975e26c3c4210ab93df
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.24.x86_64.rpm
          ef6477f4e8d9386e8c14e5f33cab6e15

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.276.x86_64.rpm
          a1ec9ed29e7b844639fb264c0c051f79
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.276.x86_64.rpm
          9c18e347968bc60d4e32b67557c1830b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.276.x86_64.rpm
          205bd72a791fd24589330c152f73d18b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.276.x86_64.rpm
          63ada2081021bc1307c6153ccd043b87

   Sources:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-admin_en-10-7.5.src.rpm
          43095bf3f55a08d8064a021d6aaa1db7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-docs-2.0-17.5.src.rpm
          abe9f0dc42be1ce5c7590f357d9d134b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-parser-2.0-21.5.src.rpm
          7fe00c347fec96fef49bf0463b209210
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-profiles-2.0-34.9.src.rpm
          c6b49655962246afcc288c2df8eed31f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-utils-2.0-23.5.src.rpm
          5257e473bc5e8a6f7c4dccd5e6a9ae55
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/audit-1.1.3-23.3.src.rpm
          cf3d5c02a37d737c0178c72ea84ee203
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/drbd-0.7.18-3.3.src.rpm
          f7c33143e57fb99cf0b392096d9f7d44
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-bigsmp-2.6.16.21-0.13.nosrc.rpm
          9359a72d2f9016a61beb36f6b2f0fa28
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-debug-2.6.16.21-0.13.nosrc.rpm
          4a26cacb10c6dbf2706fadc4b83535e4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-default-2.6.16.21-0.13.nosrc.rpm
          235efd96d5f7c6ccfc9a398cc8d27108
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-iseries64-2.6.16.21-0.13.nosrc.rpm
          40dc372c825056205aa0c1cc1de2473b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-kdump-2.6.16.21-0.13.nosrc.rpm
          ed77128c1b3433a22c12cb78491d9353
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-ppc64-2.6.16.21-0.13.nosrc.rpm
          d322ff866d8534ad3bc53e6dabc3443d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-smp-2.6.16.21-0.13.nosrc.rpm
          a4aeb424592289ef78edcdd6cd1449db
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-source-2.6.16.21-0.13.src.rpm
          9173110fbf71bfb007b9a560e3a9bad6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-syms-2.6.16.21-0.13.src.rpm
          02cdf335631f2da95056cba8eda0f165
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-um-2.6.16.21-0.13.nosrc.rpm
          1324aec2bfd8c3530e8f90088cc25c81
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xen-2.6.16.21-0.13.nosrc.rpm
          1250728306b9b3253ae82afedf0f1e4a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xenpae-2.6.16.21-0.13.nosrc.rpm
          f193f3d82e8b0aa15d7ab13a081a7cf2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kexec-tools-1.101-32.17.src.rpm
          3374197c18ba7324995f433a939fbe54
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/mkinitrd-1.2-106.15.src.rpm
          ddf61f16d38e997d85fd04fdf64eaa02
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/multipath-tools-0.4.6-25.9.src.rpm
          261e2516378e1e6596f9ad767a0594bc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/open-iscsi-0.5.545-9.13.src.rpm
          852e15549b54733414a667631052840b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/udev-085-30.11.src.rpm
          330f5f4e04d9448b023301d3ff332305
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/xen-3.0.2_09749-0.7.src.rpm
          9adfc5f7c109b6c7f206d2765b99f1ec
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/yast2-apparmor-2.0-27.5.src.rpm
          279b8397e1cd4fd829b12f09018f46cc

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.6.src.rpm
          4b3fb42d44b1cf10ab6d4ede6bb67fa0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.11.nosrc.rpm
          e05d21d1ad9f1c3ea3268dde157fe13b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.11.nosrc.rpm
          f10fad044c2193fa6261096b223db611
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.11.nosrc.rpm
          3190b4017784a56bb412971d6ed06a1f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.11.nosrc.rpm
          bcfbd7b1edbc5a97d9fda3f540d0be9d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.11.nosrc.rpm
          b590965d0190dfe933b8e3572a190706
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.11.nosrc.rpm
          00a4a6bcab31204089ec8464b070ecf9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.11.src.rpm
          790f0f0352d0f3cceb730a4e06f1951f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.11.src.rpm
          0c017619952331561adfbed8399d7aff
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.11.nosrc.rpm
          c2ed71e73606a5330f55870b8f1d7d38
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.11.nosrc.rpm
          9fcc6eb7846ddd324f4c88a9f1a99eea

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.7.src.rpm
          e84f71edcbbad93da19fca50936e457f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.13.nosrc.rpm
          c2d704c30248e369c1256c9cbda9c792
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.13.nosrc.rpm
          a83446d1d83069403cf167da49f7e4ac
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.13.src.rpm
          515752e1ce2951bf3338664c6db1e93f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.13.nosrc.rpm
          2227766974f9d279173ff67adac2846a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.13.src.rpm
          a7eb9d1dde2fbf036057c3eea7da228f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.13.src.rpm
          bd62cf4acca249292569a439d1b95a08
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.13.nosrc.rpm
          7f5d2e691cf0e2373b85895e7518a1ff
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.13.nosrc.rpm
          f637f470f98d0c2ed239dae6d57461b8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.7.src.rpm
          a070d16b8d8f48d7df10f4a2a7553746
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.7.src.rpm
          a4df9d5558c21e322565bb837443b249

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.16.src.rpm
          df33c271d1a488f4b546947c9100e856
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.24.nosrc.rpm
          4baaed24bac712a743c68e6da5328bbd
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.24.nosrc.rpm
          a12e6479c058a95c5c057359df1f87ac
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.24.src.rpm
          d49b746c707e82b7552e09ca752b012c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.24.nosrc.rpm
          2e4370a418fb2cd663e19f1b5722e8d2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.24.src.rpm
          ddb880da28744d6906698a6d71772b9a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.24.src.rpm
          be826c69b6a717786bc4a42d4558d666
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.24.nosrc.rpm
          73f298756b8c260db19f66045702de42
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.16.src.rpm
          929a46b7e2e7045c182909134c90f764
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.15.src.rpm
          933712007872a733e4f8f2f7a2d6040f

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.276.nosrc.rpm
          86501653c20812d977ea23f47af5c9d3
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.276.nosrc.rpm
          6fc2656d5c81821db987ccfa26ad51ea
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.276.src.rpm
          8541534925706aa2063d874f14a365a6
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.276.nosrc.rpm
          c9a6e3ee6a98005ecd4710a8b0bc8c4e
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.276.src.rpm
          523fd5b4a12c8c666818ea94e9e699e3
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.276.src.rpm
          660abce3f8e14427bbaf17e3fa01d115
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.24.src.rpm
          d259fef3b0115765990fb4e58cee0e40
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.276.nosrc.rpm
          77411e0e5b44ae7ca78bc0e9ed77e646
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.276.src.rpm
          da439bf54800360273231d0a62e00f72
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.276.nosrc.rpm
          862a7fafdee7df50a02aceac09f86017
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.276.src.rpm
          61a48f3900f2c1d2fd389dff0566225d
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.276.src.rpm
          cd0906f0fc78df823b65df1b6de63944

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@suse.de>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

       to verify the signature of the package, replacing <file.rpm> with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum <filename.rpm>

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (FAQ),
    send mail to <suse-security-info@suse.com> or
    <suse-security-faq@suse.com>.

    =====================================================================
    SUSE's security contact is <security@suse.com> or <security@suse.de>.
    The <security@suse.de> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID     Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRMd4lXey5gA9JdPZAQI79gf/R9BbReJKlkRL8YMn8TOrWJXc4sJ1M2xA
SGQV4vq7cuhYPoyiW9TANnRn/w57iBIrwZWUtg4atSENOhjaZrjm8nwiHoSp1xZn
u+iM57hbt38CiPt06CzLf0DrC9vKh7znHhTOXh0/8QeQA+gGF0g1z+LHcmxECkom
JFcZ82lz7jKknTycH8ySo09o25eGUrfhzmpzPb8JLglUUpZ4tXaWN+OJG0c7RiWl
fN8xyq9zyVjxK4uLHwWtIjAUvT3mriJdJU7Snr+11H/mkJEq3Of8LobMFKVVKPTQ
7YweB4E0KwsMBIJpweeT6x+nXEupxtAlKkhBlZpX/9vgmdUjdjZa0w==
=qXhX
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F48071)

Mandriva Linux Security Advisory 2006.116 (PacketStormID:F48071)
2006-07-09 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2005-3359,CVE-2005-3784,CVE-2005-3858,CVE-2005-4618,CVE-2006-0096,CVE-2006-0555,CVE-2006-1242,CVE-2006-1525,CVE-2006-1528,CVE-2006-1855,CVE-2006-1856,CVE-2006-2071,CVE-2006-2271,CVE-2006-2272,CVE-2006-2444
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-116 - A ridiculous number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:116
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : July 5, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to 2.6.14, the atm module allows local users to cause a Denial of
 Service (panic) via certain socket calls that produce inconsistent
 reference counts for loadable protocol modules (CVE-2005-3359).
 
 Prior to 2.6.15, the auto-reap child processes included processes with
 ptrace attached, leading to a dangling ptrace reference and allowing
 local users to cause a Denial of Service (crash) (CVE-2005-3784).
 
 Prior to and including 2.6.12, a memory leak in the ip6_input_finish
 function could allow an attacker to cause a Denial of Service via
 malformed IPv6 packets with unspecified parameter problems, which
 prevents SKB from being freed (CVE-2005-3858).
 
 Prior to 2.6.15, a buffer overflow in sysctl could allow a local user
 to corrupt user memory and possibly cause a Denial of Service via a
 long string, causing sysctl to write a zero byte outside the buffer
 (CVE-2005-4618).
 
 Prior to 2.6.11, wan/sdla.c does not require CAP_SYS_RAWIO privilege
 for an SDLA firmware upgrade, with unknown impact and local attack
 vectors (CVE-2006-0096).
 
 Prior to 2.6.15.5, a local user could cause a Denial of Service (NFS
 client panic) via unknown attack vectors related to the use of O_DIRECT
 (direct I/O) (CVE-2006-0555).
 
 Prior to 2.6.16, the ip_push_pending_frames function increments the IP
 ID field when sending a RST after receiving unsolicited TCP SYN-ACK
 packets, which allows a remote attacker to conduct an idle scan attack,
 bypassing any intended protection against such an attack
 (CVE-2006-1242).
 
 Prior to 2.6.16.8, the ip_route_input function allows local users to
 cause a DoS (panic) via a request for a route for a multicast IP
 address, which triggers a null dereference (CVE-2006-1525).
 
 Prior to 2.6.13, local users could cause a Denial of Service (crash)
 via a dio transfer from the sg driver to memory mapped IO space
 (CVE-2006-1528).
 
 Prior to 2.6.11.12, the choose_new_parent function includes certain
 debugging code which could allow a local user to cause a Denial of
 Service (panic) by causing certain circumstances involving termination
 of a parent process (CVE-2006-1855).
 
 Prior to and including 2.6.16, the kernel did not add the appropriate
 LSM file_permission hooks to the readv and writev functions, which
 could allow an attacker to bypass intended access restrictions
 (CVE-2006-1856).
 
 Prior to 2.6.16, local users can bypass IPC permissions and modify a
 read-only attachment of shared memory by using mprotect to give write
 permission to the attachment (CVE-2006-2071).
 
 Prior to 2.6.17, the ECNE chunk handling in SCTP (lksctp) allows remote
 attackers to cause a DoS (kernel panic) via an unexpected chucnk when
 the session is in CLOSED state (CVE-2006-2271).
 
 Prior to 2.6.17, SCTP (lksctp) allows remote attacker to cause a DoS
 (kernel panic) via incoming IP fragmented COOKIE_ECHO and HEARTBEAT
 SCTP control chunks (CVE-2006-2272).
 
 Memory corruption can be triggered remotely when the ip_nat_snmp_basic
 module is loaded and traffic on port 161 or 162 is NATed
 (CVE-2006-2444).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3359
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4618
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0096
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0555
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1525
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1855
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1856
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2271
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2272
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 a5f9a1061112afa86f10ec1bdc9d49f0  corporate/3.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.i586.rpm
 edf706536ecb71300eb53c42838dfb7f  corporate/3.0/RPMS/kernel-BOOT-2.6.3.32mdk-1-1mdk.i586.rpm
 27be129a647b32dab207593327cfbdb0  corporate/3.0/RPMS/kernel-enterprise-2.6.3.32mdk-1-1mdk.i586.rpm
 25df51c79bda0995e1ab5e626bed3365  corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.32mdk-1-1mdk.i586.rpm
 9d6f94621c8d02ea4a2378575b9150b8  corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.32mdk-1-1mdk.i586.rpm
 0a15845463acdec596ba4b02e718087e  corporate/3.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.i586.rpm
 6cd61286a7e3aac569186465e6d37e67  corporate/3.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.i586.rpm
 4b1b11ed7ea70b3119eab29783739f06  corporate/3.0/RPMS/kernel-source-2.6.3-32mdk.i586.rpm
 ae918285bd5b813d3dbac4dc180c0d6d  corporate/3.0/RPMS/kernel-source-stripped-2.6.3-32mdk.i586.rpm
 a4632a1ebf83f95f547d266abaad2106  corporate/3.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 cb09cd5187a99ea139bf82783bd184a4  x86_64/corporate/3.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.x86_64.rpm
 139e7d1dedffe1f4f44c6e988b5c4ef2  x86_64/corporate/3.0/RPMS/kernel-BOOT-2.6.3.32mdk-1-1mdk.x86_64.rpm
 f8d744824c238b071eafda67136592ae  x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.x86_64.rpm
 0ab64016fffb13934347e3d5cba2b45e  x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.x86_64.rpm
 437cfd7b69813e44cda4e0fe6e091521  x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-32mdk.x86_64.rpm
 dee29e29dc05f364ceb389144144c469  x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-32mdk.x86_64.rpm
 a4632a1ebf83f95f547d266abaad2106  x86_64/corporate/3.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 3d6ff857e798601ce4cf62c16e29ed42  mnf/2.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.i586.rpm
 94ea4314713ca6a39120a066b9dd9b59  mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.32mdk-1-1mdk.i586.rpm
 694ad7fad48ec9a0b0bdb6a7b1e94148  mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.32mdk-1-1mdk.i586.rpm
 d602f9f1e991794a1cedb21e1b87e949  mnf/2.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.i586.rpm
 c7a984793f0f81d33bedd18eebd34228  mnf/2.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.i586.rpm
 81a4bfaab9d2a45a8500f2741f1db6a5  mnf/2.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEq9cGmqjQ0CJFipgRAjRFAKDkoTvT4ht14u+E3EyZYDadNRql8wCgoiNp
ycOpCb9cZ6HIXDL0KeZwIDc=
=5WcB
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47620)

Ubuntu Security Notice 302-1 (PacketStormID:F47620)
2006-06-26 00:00:00
Ubuntu  ubuntu.com
advisory,kernel,vulnerability
linux,ubuntu
CVE-2006-0038,CVE-2006-0744,CVE-2006-1055,CVE-2006-1056,CVE-2006-1522,CVE-2006-1527,CVE-2006-1528,CVE-2006-1855,CVE-2006-1856,CVE-2006-1857,CVE-2006-1858,CVE-2006-1859,CVE-2006-1860,CVE-2006-1864,CVE-2006-2071,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Ubuntu Security Notice 302-1 - A ridiculous amount of vulnerabilities have been patched in the Linux 2.6 kernel series for Ubuntu.

=========================================================== 
Ubuntu Security Notice USN-302-1              June 15, 2006
linux-source-2.6.10/2.6.12/2.6.15 vulnerabilities
CVE-2006-0038, CVE-2006-0744, CVE-2006-1055, CVE-2006-1056,
CVE-2006-1522, CVE-2006-1527, CVE-2006-1528, CVE-2006-1855,
CVE-2006-1856, CVE-2006-1857, CVE-2006-1858, CVE-2006-1859,
CVE-2006-1860, CVE-2006-1864, CVE-2006-2071, CVE-2006-2271,
CVE-2006-2272, CVE-2006-2274, CVE-2006-2275, CVE-2006-2444
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  linux-image-2.6.10-6-386                          2.6.10-34.20
  linux-image-2.6.10-6-686                          2.6.10-34.20
  linux-image-2.6.10-6-686-smp                      2.6.10-34.20
  linux-image-2.6.10-6-amd64-generic                2.6.10-34.20
  linux-image-2.6.10-6-amd64-k8                     2.6.10-34.20
  linux-image-2.6.10-6-amd64-k8-smp                 2.6.10-34.20
  linux-image-2.6.10-6-amd64-xeon                   2.6.10-34.20
  linux-image-2.6.10-6-k7                           2.6.10-34.20
  linux-image-2.6.10-6-k7-smp                       2.6.10-34.20
  linux-image-2.6.10-6-power3                       2.6.10-34.20
  linux-image-2.6.10-6-power3-smp                   2.6.10-34.20
  linux-image-2.6.10-6-power4                       2.6.10-34.20
  linux-image-2.6.10-6-power4-smp                   2.6.10-34.20
  linux-image-2.6.10-6-powerpc                      2.6.10-34.20
  linux-image-2.6.10-6-powerpc-smp                  2.6.10-34.20
  linux-patch-ubuntu-2.6.10                         2.6.10-34.20
  linux-source-2.6.10                               2.6.10-34.20
  linux-tree-2.6.10                                 2.6.10-34.20

Ubuntu 5.10:
  linux-image-2.6.12-10-386                         2.6.12-10.34
  linux-image-2.6.12-10-686                         2.6.12-10.34
  linux-image-2.6.12-10-686-smp                     2.6.12-10.34
  linux-image-2.6.12-10-amd64-generic               2.6.12-10.34
  linux-image-2.6.12-10-amd64-k8                    2.6.12-10.34
  linux-image-2.6.12-10-amd64-k8-smp                2.6.12-10.34
  linux-image-2.6.12-10-amd64-xeon                  2.6.12-10.34
  linux-image-2.6.12-10-k7                          2.6.12-10.34
  linux-image-2.6.12-10-k7-smp                      2.6.12-10.34
  linux-image-2.6.12-10-powerpc                     2.6.12-10.34
  linux-image-2.6.12-10-powerpc-smp                 2.6.12-10.34
  linux-image-2.6.12-10-powerpc64-smp               2.6.12-10.34
  linux-patch-ubuntu-2.6.12                         2.6.12-10.34
  linux-source-2.6.12                               2.6.12-10.34
  linux-tree-2.6.12                                 2.6.12-10.34

Ubuntu 6.06 LTS:
  linux-image-2.6.15-25-386                         2.6.15-25.43
  linux-image-2.6.15-25-686                         2.6.15-25.43
  linux-image-2.6.15-25-amd64-generic               2.6.15-25.43
  linux-image-2.6.15-25-amd64-k8                    2.6.15-25.43
  linux-image-2.6.15-25-amd64-server                2.6.15-25.43
  linux-image-2.6.15-25-amd64-xeon                  2.6.15-25.43
  linux-image-2.6.15-25-k7                          2.6.15-25.43
  linux-image-2.6.15-25-powerpc                     2.6.15-25.43
  linux-image-2.6.15-25-powerpc-smp 2.              6.15-25.43
  linux-image-2.6.15-25-powerpc64-smp               2.6.15-25.43
  linux-image-2.6.15-25-server                      2.6.15-25.43
  linux-image-2.6.15-25-server-bigiron              2.6.15-25.43
  linux-source-2.6.15                               2.6.15-25.43
  avm-fritz-firmware                                2.6.15.23
  avm-fritz-firmware-2.6.15-25                      2.6.15.11-2
  avm-fritz-kernel-source                           2.6.15.11-2
  fglrx-control                                     2.6.15.11-2
  fglrx-kernel-source                               2.6.15.11-2
  xorg-driver-fglrx                                 2.6.15.11-2
  xorg-driver-fglrx-dev                             2.6.15.11-2
  nvidia-glx                                        2.6.15.11-2
  nvidia-glx-dev                                    2.6.15.11-2
  nvidia-glx-legacy                                 2.6.15.11-2
  nvidia-glx-legacy-dev                             2.6.15.11-2
  linux-restricted-modules-2.6.15-25-386            2.6.15.11-2
  linux-restricted-modules-2.6.15-25-686            2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-generic  2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-k8       2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-xeon     2.6.15.11-2
  linux-restricted-modules-2.6.15-25-k7             2.6.15.11-2
  linux-restricted-modules-2.6.15-25-powerpc        2.6.15.11-2
  linux-restricted-modules-2.6.15-25-powerpc-smp    2.6.15.11-2
  linux-restricted-modules-386                      2.6.15.23
  linux-restricted-modules-686                      2.6.15.23
  linux-restricted-modules-amd64-generic            2.6.15.23
  linux-restricted-modules-amd64-k8                 2.6.15.23
  linux-restricted-modules-amd64-xeon               2.6.15.23
  linux-restricted-modules-common                   2.6.15.11-2
  linux-restricted-modules-k7                       2.6.15.23
  linux-restricted-modules-powerpc                  2.6.15.23
  linux-restricted-modules-powerpc-smp              2.6.15.23
  linux-386                                         2.6.15.23
  linux-686                                         2.6.15.23
  linux-686-smp                                     2.6.15.23
  linux-k7                                          2.6.15.23
  linux-k7-smp                                      2.6.15.23
  linux-power3                                      2.6.15.23
  linux-power3-smp                                  2.6.15.23
  linux-power4                                      2.6.15.23
  linux-power4-smp                                  2.6.15.23
  linux-powerpc                                     2.6.15.23
  linux-powerpc-smp                                 2.6.15.23
  linux-powerpc64-smp                               2.6.15.23
  linux-amd64-generic                               2.6.15.23
  linux-amd64-k8                                    2.6.15.23
  linux-amd64-k8-smp                                2.6.15.23
  linux-amd64-server                                2.6.15.23
  linux-amd64-xeon                                  2.6.15.23
  linux-server                                      2.6.15.23
  linux-server-bigiron                              2.6.15.23
  linux-image-386                                   2.6.15.23
  linux-image-686                                   2.6.15.23
  linux-image-amd64-generic                         2.6.15.23
  linux-image-amd64-k8                              2.6.15.23
  linux-image-amd64-server                          2.6.15.23
  linux-image-amd64-xeon                            2.6.15.23
  linux-image-k7                                    2.6.15.23
  linux-image-power3                                2.6.15.23
  linux-image-power3-smp                            2.6.15.23
  linux-image-power4                                2.6.15.23
  linux-image-power4-smp                            2.6.15.23
  linux-image-powerpc                               2.6.15.23
  linux-image-powerpc-smp                           2.6.15.23
  linux-image-powerpc64-smp                         2.6.15.23
  linux-image-server                                2.6.15.23
  linux-image-server-bigiron                        2.6.15.23

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel
update has been given a new version number, which requires you to
recompile and reinstall all third party kernel modules you might have
installed. If you use linux-restricted-modules, you have to update
that package as well to get modules which work with the new kernel
version. Unless you manually uninstalled the standard kernel
metapackages (linux-386, linux-powerpc, linux-amd64-generic), a
standard system upgrade will automatically perform this as well.

Details follow:

An integer overflow was discovered in the do_replace() function. A
local user process with the CAP_NET_ADMIN capability could exploit
this to execute arbitrary commands with full root privileges.
However, none of Ubuntu's supported packages use this capability with
any non-root user, so this only affects you if you use some third
party software like the OpenVZ virtualization system. (CVE-2006-0038)

On EMT64 CPUs, the kernel did not properly handle uncanonical return
addresses. A local user could exploit this to trigger a kernel crash.
(CVE-2006-0744)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

Jan Beulich discovered an information leak in the handling of
registers for the numeric coprocessor when running on AMD processors.
This allowed processes to see the coprocessor execution state of
other processes, which could reveal sensitive data in the case of
cryptographic computations. (CVE-2006-1056)

Marcel Holtmann discovered that the sys_add_key() did not check that
a new user key is added to a proper keyring. By attempting to add a
key to a normal user key (which is not a keyring), a local attacker
could exploit this to crash the kernel. (CVE-2006-1522)

Ingo Molnar discovered that the SCTP protocol connection tracking
module in netfilter got stuck in an infinite loop on certain empty
packet chunks. A remote attacker could exploit this to cause the
computer to hang. (CVE-2006-1527)

The SCSI I/O driver did not correctly handle the VM_IO flag for memory
mapped pages used for data transfer. A local user could exploit this
to cause a kernel crash. (CVE-2006-1528)

The choose_new_parent() contained obsolete debugging code. A local
user could exploit this to cause a kernel crash. (CVE-2006-1855)

Kostik Belousov discovered that the readv() and writev() functions did
not query LSM modules for access permission. This could be exploited
to circumvent access restrictions defined by LSM modules such as
SELinux or AppArmor. (CVE-2006-1856)

The SCTP driver did not properly verify certain parameters when
receiving a HB-ACK chunk. By sending a specially crafted packet to an
SCTP socket, a remote attacker could exploit this to trigger a buffer
overflow, which could lead to a crash or possibly even arbitrary code
execution. (CVE-2006-1857)

The sctp_walk_params() function in the SCTP driver incorrectly used
rounded values for bounds checking instead of the precise values. By
sending a specially crafted packet to an SCTP socket, a remote
attacker could exploit this to crash the kernel. (CVE-2006-1858)

Bjoern Steinbrink reported a memory leak in the __setlease() function.
A local attacker could exploit this to exhaust kernel memory and
render the computer unusable (Denial of Service). (CVE-2006-1859)

Daniel Hokka Zakrisson discovered that the lease_init() did not
properly handle locking. A local attacker could exploit this to cause
a kernel deadlock (Denial of Service). (CVE-2006-1860)

Mark Moseley discovered that the CIFS file system driver did not
filter out "..\\" path components. A local attacker could exploit this
to break out of a chroot environment on a mounted SMB share.
(CVE-2006-1863) The same vulnerability applies to the older smb file
system. (CVE-2006-1864)

Hugh Dickins discovered that the mprotect() function allowed an user
to change a read-only shared memory attachment to become writable,
which bypasses IPC (inter-process communication) permissions.
(CVE-2006-2071)

The SCTP (Stream Control Transmission Protocol) driver triggered a
kernel panic on unexpected packets while the session was in the CLOSED
state, instead of silently ignoring the packets. A remote attacker
could exploit this to crash the computer. (CVE-2006-2271)

The SCTP driver did not handle control chunks if they arrived in
fragmented packets. By sending specially crafted packets to an SCTP
socket, a remote attacker could exploit this to crash the target
machine. (CVE-2006-2272)

The SCTP driver did not correctly handle packets containing more than
one DATA fragment. By sending specially crafted packets to an SCTP
socket, a remote attacker could exploit this to crash the target
machine. (CVE-2006-2274)

The SCTP driver did not correcly buffer incoming packets. By sending a
large number of small messages to a receiver application that cannot
process the messages quickly enough, a remote attacker could exploit
this to cause a deadlock in the target machine (Denial of Service).
(CVE-2006-2275)

Patrick McHardy discovered that the snmp_trap_decode() function did
not correctly handle memory allocation in some error conditions. By
sending specially crafted packets to a machine which uses the SNMP
network address translation (NAT), a remote attacker could exploit
this to crash that machine. (CVE-2006-2444)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20.diff.gz
      Size/MD5:  6119119 7c8e68b20e2b5772e11e86ef1f107378
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20.dsc
      Size/MD5:     2511 ed2776255bbc37d4ec28219bc666450e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.20_all.deb
      Size/MD5:  6780262 84c4f6e1c0f8be97a6663e662d00f94e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20_all.deb
      Size/MD5: 37515070 13f5a6bd597bd7cc26e7e7570241752f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.20_all.deb
      Size/MD5:   506344 e43866ad706b123ccb1f7887a3bfc77d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    20830 65039758c34a2b9803898d0f1577e31a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    47404 11ca50ec66cef3ff27e69bf5ddf5c09d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    88900 07a8b316cc28e767d57d5f3490d71cf7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    30022 64dd2350ae98f77f22c23417be29ed1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    41250 8202527668e86a9402a924c7e92fdf21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    73604 d2dc1615ad0e2b353cf60c6042860f9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     5740 060e8b24a3caeb9734f99cf15e0f5152
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    34858 0f1ec19756bf0a7ba2e016d4320c9c87
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    55186 9e502b339d5177ce631da3c018287a69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   112960 c3c0c8327e1ccfad7658c720376879fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    40822 19212c1693af337d6c46708d4d6ac3e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   115724 5b364365f7159780cc0aa3bc10a34f81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   174642 f71484abfe8ad8983c12918d4ed28a57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    82588 37375ba4e1c4aeb59ffa3106fdc58af6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:  1467824 9d3b04576eae7b5b10c2778d39b6c61d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-generic_2.6.10-34.20_amd64.deb
      Size/MD5:   287694 f2f80ea9d6a88534431cb7ec24fa0409
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8-smp_2.6.10-34.20_amd64.deb
      Size/MD5:   284634 0a06c99af6feb7ebbe92bdf2c7d4d38c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8_2.6.10-34.20_amd64.deb
      Size/MD5:   286712 3f7c598c4fa35817b97ed04ec158c77f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-xeon_2.6.10-34.20_amd64.deb
      Size/MD5:   282278 14e98f8869fe645838d6dde8960a9b40
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_amd64.deb
      Size/MD5:  6140598 040fdc36ca15c657879fb233e96babdd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-generic_2.6.10-34.20_amd64.deb
      Size/MD5: 14580658 b71a8184f6ca78720675c5b5f4275d6c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8-smp_2.6.10-34.20_amd64.deb
      Size/MD5: 15123142 2d3d006dc78a32754008cff3e6612def
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8_2.6.10-34.20_amd64.deb
      Size/MD5: 15092724 4e734222617027d0826e084a7e3597cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-xeon_2.6.10-34.20_amd64.deb
      Size/MD5: 14964346 bccdcbefb5bb21210d151f74f0d4ea1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_amd64.deb
      Size/MD5:  1367274 5255ea709eba9438f864847990f649a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    14228 bc2ab7f3dbcb6bb6254a7d95961a7765
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   178508 c29516f2b3469af77163b72298d5e6f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   174888 f25921c93694a64110d5a7e11c07a54a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   731206 feca94b0d02954dba96aa826e7ebaf9b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   780904 ee21c0a8ad817f4ce2bc0c7bf908ddcf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   150048 3b4939210ceb4e7760e7884b9f61f563
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   168132 93557c5149b0c723cb6b1bae1d3223ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     9560 b398092e7a80607f99e844001b9ce2a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    94864 91055c75c5899688a3603311f3cd71e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    45730 4b389bad5ff04bc593232239ff596147
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    33166 c3d8d2b805db006bbc15251294d3dfa0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    55288 5a3852574c27da25e4724161b869db97
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     4662 68477a5fa1a36be1105e3c456dd17c75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     7840 64d5bb446a53cbdf80acf4395943026b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    53806 b7e9b1db8d8a0ab3b587c476b8d9f43a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   111110 473a540114b990167e88b1b835ae7057
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    10152 476e66c50bcbcb4d88a8bf15d55ff46c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    60466 717dea9008ecb9b9a36d0226cf0be1f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   208566 6d9952396755a259def5a4386f0e904a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    69268 49723731dd5fc33f5448bbd4a884492e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   394794 d1c46e57ff011765315159a483c3a0c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   294492 420dcb7e37eb1ddb31c47d3412f46b4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    12076 3e1008788d41da3c607ef400421a1433
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    22660 e87793acc7765a88790795b4062ee8e3
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    28806 9e57e710d0fd1904006a61a4f85e659a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    56802 c415dc22fc38a9adf2d2e8c521b828f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    34942 ee496b5e756fcee4fa52d9af50e159f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   247472 8576417b43eb0294626b1b388304c38b

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    18168 ec0160e67b576a45d0a9b60f9df0539f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    44820 7087171327e9f1897f66c2402ee4f1aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   103058 acb437d3e579f3c41a0c2d701f21af96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    86016 7ca15ee69ed2d3e4c62b31854ff4efd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    29086 f8c9d199ee551ca45422a5431932e437
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    39778 23600db6a281e3e1c1a3b065f9b14d54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    71152 2e45e650a63660f4c86ed54cbe29d858
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     5500 d58ec539fae5fa95e142147ef369fd2a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    31584 15cf4fd046eadeff2dad6464da7ec09b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    52934 6936463adcdda3629c1e758d90f0493b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   104464 4b865ee7bd1286623919a96dd9d331b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    38630 27e882c090989d77f3613765117cf77d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   114518 89928ea529948cc91aed23a4521d5b12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   190634 bab287374233f076f223e0b88b34cb6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    86542 b6070419effbc3e1b4bada780612a0de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:  1390250 90397cbe2b320b07a1e5fda28405b4d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-386_2.6.10-34.20_i386.deb
      Size/MD5:   316356 536287da6a00cd58f2335077cbf4538a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686-smp_2.6.10-34.20_i386.deb
      Size/MD5:   312524 30b03b28a5de3945cfd07ff4742d1016
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686_2.6.10-34.20_i386.deb
      Size/MD5:   314566 e0309dbc4bde6ac4f9f9fe69668b04c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7-smp_2.6.10-34.20_i386.deb
      Size/MD5:   312622 3ea4ddbee4b030178d541f6fb467d6b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7_2.6.10-34.20_i386.deb
      Size/MD5:   314494 237e095f6a0cec83a253bbf3944bc50a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_i386.deb
      Size/MD5:  6138030 600e2668b0fbfe98f6cf40947f2eb9a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-386_2.6.10-34.20_i386.deb
      Size/MD5: 15613392 0c393fb103e76a59807f845de341fef1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686-smp_2.6.10-34.20_i386.deb
      Size/MD5: 16192420 995c8a1c4dbc44ce3fb966e8faa59768
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686_2.6.10-34.20_i386.deb
      Size/MD5: 16610356 305ad210ff1462bb06262d17018dbf31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7-smp_2.6.10-34.20_i386.deb
      Size/MD5: 16304792 e43e2941f65e41e7cee26f64ae737840
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7_2.6.10-34.20_i386.deb
      Size/MD5: 16672754 64786d4f0570987aaf6b106d83ad8c0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_i386.deb
      Size/MD5:  1366740 e3d2c30fa56a1d70855fe39dfd9af844
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    14078 3a8f33521e4a40bda0381d1d327e8968
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   183204 9a26ca972e9c058f0f3be0ce86bcc00d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   172774 20fe5bfbc166f19e8e9b59043141c751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   967872 16408fee6b8a70873333de59be722fbd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   780696 f30b922d0fac29994e579ba10b5eafb8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   140664 ad7cd49cb8c75b647d43cf8e99791ff0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   167946 598ddd006ee677dff42595b7d1ebceb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     9348 aff045a5ad6beb07a182a9ddb47d93b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    89314 9512161ad259441500ef387be3489caf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    48132 efbdc49d69ce5824edadd669d7cd74bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    30888 b3aac589af98b88c4696c1ce7bf13903
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    65900 652608558ced1aef35538bcfdf27b4ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     4508 c8fedf5c2e7e188e5744c1a62dea7751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     7754 a2813cdb0ae48a17a982a3eb7076fd57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    50776 dbf5a86b0ef07adf110fc4ed6279d73a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   111590 eb734c5213dc7329835012bd7126fef1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     9888 f316e1bba8978f441ea19c5780dc53d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    57156 a61515fe14e712e6ac7d982ec679dbf3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   242024 fe8a20aa87bc575dce65b91aed8f3c58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    66234 673964dcc1a485e62d7fcad8ceb6c04f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   436586 7ec1b2fc9ee8014a4ef8c329f32f8de5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   485668 859d40f7912cb33297ea6681006511ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    11470 ee405fc9ce8a4bce5ebb4899a43e1d9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    21242 a031ea0b4fee833a15bf6aa0912e6edf
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    29524 9df7a73cf3bf3b3cddc6c5906927f7c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   106268 86fb1955e75d519bf508c704d4ac50d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    33826 cd0c18957807b607b09238638d599cef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   261336 762d2b5c78eb1fcce934f16890ea2cb4

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24056 757289889190318a2d93dd15a65e32eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24060 ba42a459cdf5bed60f0ad664d8139cca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24046 993a4a25a8799a091fd67668950af050
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58284 1240aa61d4c5b12d7767cc02cdf875d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58284 0619c018768308c30117c01c731ad1c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58270 315b06ba207fac7ac09249157e262ae2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30288 099d26860dff0de837745950b485c98b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30286 4dc160336fe27917b0626f35164af488
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30274 853d7980f7b2c59a1ad311fa805f4756
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109250 caa823915173bb1677cdabb549fa8d95
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109244 e84f7701fdf1d516a0589f9a82f640df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109230 844fb56d5fa39e623ae8d5cd7dbe4e21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35388 ea0da0bba16cc5429dc73140469f7266
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35396 4ce2b8c990d878105d0b2dd6b1b9a6af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35388 8e82796824a725298c828a5d031fe205
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30934 f69937ec030ea1211eb7a24e9742adee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30930 7045ce60155a9da3daf229f4a07a9406
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30912 53f2d8f4f6ede12ad6b11830b0f2f021
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212970 472a248518c1b7048ea96d1b23456ad6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212958 5a1b6e8c5b8dfe4a0185d02c0fc26554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212934 10a25aaa511cdf7a75681bce0c632515
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6168 8884b25754c49f6dc547c596b9285b71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6168 edabe961784ea57073a121691048c6df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6156 64611d41b8c9228a19c727625c116f12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43432 c945080cc74082d3869523caa5754f48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43420 24d2e6b4126804665a6628e7eb895faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43422 4b8f545bf6e266a0dd497aff16ca0332
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4588 19a2f7191250805c1b4e11cd66e9ad9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4586 f8c968ad24ebe9b063558af9d420188b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4592 48e517e5e8220932037b4f5b5c56b25c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66046 f892b8dbb091ea7a618c51cd9af05754
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66036 506c3d7f5569dbe0b67062891cf6625e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66036 37791de6094db317454f48dd800e2b11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   117114 18306380adcbe37bce01d1aa271037cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   117100 39543336fafdac80b7b5c1f1ba146511
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   116858 a1969109547b95038c0d4c2d82083798
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66654 45afe2041ca77c4d13357d8584d65e55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66646 8d3681b2149e49d856d5b7a945334bd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66636 7dd7f75bf19ce375422498cc62c4d9f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142052 8da92eb380b87a21de0fc6b1ef2c1358
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142050 2b04f6f09e7a89544d5168834d922c41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142052 719aa290be93ce3068ac1ea67a437fa3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213976 101795a6563ecad2ee0fe4038cfc4766
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213980 686f231cff15cc539346186359e30940
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213948 e637923827f5f374d8ebf3a097c61a44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107008 a90440aa82a3f649a927ea8e85ea6208
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107000 ddf89961a32f81bdb80d2341685307ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107008 27a4243400b83d82226092c2e168e57d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1866842 4d45ac547824b9094e05fe3e63e7c02a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1871116 e539f7639ee9a123d235814cf885eefc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1901500 00c1cb0ccfb081f193d1307557496298
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251480 36117d5b58cfce171382a6e02314e58a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3_2.6.10-34.20_powerpc.deb
      Size/MD5:   250940 448da862924240716c18ae0f84898850
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251336 8d47fef9434788b2be5f5a522359d65c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4_2.6.10-34.20_powerpc.deb
      Size/MD5:   250838 ef7700333b9a779e4161f7ea5eb1881a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251714 557db525c5f2748c83058abfb57ec035
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc_2.6.10-34.20_powerpc.deb
      Size/MD5:   252428 f11ef2206ae15ffcc54992941c2c08a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_powerpc.deb
      Size/MD5:  6158516 8c55a8b0f59564f43828ae74687ad85b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15648120 06119c6b558d8a22d3fb8d5a1ca758eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3_2.6.10-34.20_powerpc.deb
      Size/MD5: 15211352 115bca7e2122c3af882f2623a9a3f245
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15636392 be98b2738250a6a93f38529b9b1b1c48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4_2.6.10-34.20_powerpc.deb
      Size/MD5: 15204784 3512bfa1d1938cd2c6af1eba41588674
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15552404 5dc5e6e10ecfb1749053c1fa763d201b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc_2.6.10-34.20_powerpc.deb
      Size/MD5: 15246444 41a5100af8dfc661083128ecc3f93a3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_powerpc.deb
      Size/MD5:  1366828 796bc9d0fa760e1aa182131079e9d040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17356 c91ee0cd2c8c65d84aa4339ac1e7039c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17352 2e348724033e0487eef21660787c48f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17350 952e68462a1816581efa18529aec8af5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213718 fd3c3d3e8a32befce12ea3babdf578f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213730 a40b8e505092aac312d05c096cf4a439
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213462 5f0044a3f78ed5198fb65849c0a2c8be
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210738 dcb0e2a603885b67eb7ba99c3975b7ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210746 8928793777ee8939b8e6d5535e3c5571
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210726 af72bd5a204186e19e3fcacdcf2aab1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   688490 3c6327fdbef4e4ded666c191bc261361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   688462 f943a6860e502f83cab9d6e560d4f340
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   687010 99e2b6a6e67ce1b003e7f25e724f86d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780736 d14e0a57291c99b02dba4b1d351a1acb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780768 f65a2750a293d260f761d1d12c451751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780766 aec7bd5abf7df435d3a8025f1e725a20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511284 7bc14cb016405a0b47f22f01a21ef268
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511282 f05923104b2b739cd49ee245b54811eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510908 8c05ecf22fc6a67a61f154039ded2e0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   257748 4722b3a746e61881b706539938075e8f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   257760 585446794b8c757d993551c0073f5e3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   256880 7163d9e02f6efbf75eb5d949c7b0df62
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84424 ff0f8ccb3e6b06b6eb26a44c6553952b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84434 c139668816ed9a3866892ec714464d6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84410 e6da0e37ba3c9143855046c72ca0f113
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60990 a40533076789c93f7d802f710e86c86d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60990 fc537a0b3559eeeb9e294e8dc11b3e1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60996 a3430bc4c0a1d278e9b59f247e550705
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    65014 53323a0fcbd6ef930d6d04c10ee9957c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    64994 8c8c547e820d30f5faca3daa70526992
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    65000 30da7de0797115c8e3a0c2dff0480a03
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5382 904ac2993045228a4da410aacf6b4d7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5376 c7cfd47200fab04e3faa4c695162bdc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5374 fedf96b5a2d08704b4e4878a07a3b8aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63274 9284e5151feb56b75e116c8c55fc3c68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63272 cb148f32a7f899aae29c2c5190a7e006
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63214 4f30572a28d1bb8e9a5bd10e005203e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131660 ce65874f5cf1ddd9a084bb28260b16c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131654 62e5c69450c22be6c6837c1548699a35
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131664 b45962b63cc1abd3337fd7365238aca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70978 8c036c5f7283fa8535a8baf6964c034b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70978 c028838cae3aba6a3ee55fe4c4e1a92e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70970 983bb35437777b9838cb1f524b8f9ae8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357328 5b0f07aba03289d17cc06e8b8f546be5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357322 8267fec62f2d7d68056cdb1c8b7374d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357340 f3520761c4745ae7e107830df15ae180
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80734 6882e08074865ce3cff13f95b9d23d33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80734 1d7036992784e85836f80a13590e2bc5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80744 0935af439af117d9b220cd8f231237ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511000 f8a3fdbb6f629507ca54c304c14148ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510998 a366d8a51abe41de8dcef7615efa82da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510796 7ca8480e9b3556182bfa80dd6c181550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389156 499eff26442a314eae3fe1c872b5482a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389142 7beb872afe060ccf51d7f3695730cabb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389012 6a22ab402ccbe5bd298cf4155d75d0bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63154 eea1979f3b80f2ab9abf078ac8e197f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63156 54f520b629bef13454556bb34ea08a33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63034 8951dc31e725e384d96137aea32592fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23350 9ba107926181bac0aafaad8bc9bfc9ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23348 59a355a0021eff64feabb00676684b1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23110 45047aa03d1215f589c2366284f7879f
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35380 28435b192a5a3556be33a5757be67325
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35382 2db9e69bdbf7f1cb7d5b10efcebc1246
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35372 9d921ee807cf5a579dc094e582b44887
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135108 01c56f9c0e8dd309303f2f40bc1aa39c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135092 230de80d437472f0948a9491f470cffd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135084 19e0cfda95d817fc623c4a508d4bb841
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42400 b37a28eb83f0acfe18442131564a08a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42394 d1a235c0e4de4fc37a6c2ae9e84ab2f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42402 5d060c9249ebd12487011e6166672664
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294756 bc39cce7e6ab2a363b7690f151dbbf11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294758 64fbd290ee99ec65976fa27be80d2181
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294760 eac6b1685d00367e36bc02e25feefede

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34.diff.gz
      Size/MD5:  7979048 d8fab299fe68cb01ce0d844b9fdbc6b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34.dsc
      Size/MD5:     2516 717c666291065123bf806e176d48f97f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12.orig.tar.gz
      Size/MD5: 47177098 9272115d4005d4e9773a1a6170fd20cd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-doc-2.6.12_2.6.12-10.34_all.deb
      Size/MD5:  4553566 a1ef4071c2e8f956f372096ea33a3995
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34_all.deb
      Size/MD5: 40455436 af9d928bdf0032bc223f42225433c58f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-tree-2.6.12_2.6.12-10.34_all.deb
      Size/MD5:   377152 5f84388b8a3a218d10384c83c3f528d5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    20808 d4e1b65a57dbeeac45b33f1521e12c99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    45622 8cb0121682bf09f1cac846ad64a43f5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     2320 c92669893cd0d5646a18fc4c18f68bd4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    88708 3ae3d259bd31755ed3510d5fec4ccb24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    35156 44702bad1e1adbc8770628279cbac3a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    42378 9de89c3a4ac37c66760745f43c1a000d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    70530 3c6799cc5a6ffe13980895fe22e3dee3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     5746 24ac1bdf68c192d9412ee5452ea03e5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    34338 7f7b482747e204f0a0f4db78e6a051e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    53484 25e8bad4e6d7cd6938ba1f90961e3464
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   129596 a90636d93492799fc7597e5759242b73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    43852 569c0348d5e80c94fd10b985ad807ad5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   115024 a7d6544e054dcb37145707a0a2902642
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   253688 7bb33fbec57560a4f2f7c3ccaf56ffd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    83366 6237abcaa25f389cd4c7546b43c055f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1497886 f52481f0a97e674e1e8dab3a107dfb2b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-generic_2.6.12-10.34_amd64.deb
      Size/MD5:   804646 1f19fd29274b18a73a4fc02c3c073657
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8-smp_2.6.12-10.34_amd64.deb
      Size/MD5:   802778 8faf2d64387e02bab3493334522f21e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8_2.6.12-10.34_amd64.deb
      Size/MD5:   803708 efd8f8c79f3f92f15cdf1cc366566e02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-xeon_2.6.12-10.34_amd64.deb
      Size/MD5:   800000 b8c368ca60877e92a2cabfdd30d89868
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_amd64.deb
      Size/MD5:  5919914 b413f0e78573a9c873a480fc189a423a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-generic_2.6.12-10.34_amd64.deb
      Size/MD5: 17088402 37f41a50fb5916add1d458b2e6f9dc6e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8-smp_2.6.12-10.34_amd64.deb
      Size/MD5: 18131064 30de98a63a697abcb8bf14e7ec205e60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8_2.6.12-10.34_amd64.deb
      Size/MD5: 17954132 c42a140a3c2a7646f65ef7117b05b30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-xeon_2.6.12-10.34_amd64.deb
      Size/MD5: 17898622 9f497da74da9f09eda195cc50a071b9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_amd64.deb
      Size/MD5:  3511958 490f151109d769124e4be9d231cbd3b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    14300 8ed855968175cd57d89782a2257eae44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   191796 d6bea66878fd5188fcfe3034af011b94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   170372 e6a54dc47f933d81d33c36100f06710c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1048458 f4f4157facb4a8c3ad0bf7b79ddd09e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1147282 cb81368443a48370533bf2fc8d411bea
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   122452 925cd634d430593dd61b3ead0fce05f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     8546 dc36272ab8439fa0c33dd3cf2fd4495c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    99026 5726cc1c3805a1e7dcd460f0df0347e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    44950 df5b62d66bbe6e87bf175bdb96de07e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    31658 7beb1e1d79e55022978020dd63c2571b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    65706 24c8b8c3a2b542e478b562b4965a8568
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     4478 35e0c3c2a2a8f2c3ead45252790906ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     7882 a423baf7b6a50f53eae11f7af4fe7b65
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    53872 be98c2351e732d52e81ed700ae0f4f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   107332 6e35f131fc93466a08c4e30051ca798f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     9884 e68b6e660a617b2b018e0f5882f9a132
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    69768 cee1cb4c98600a0999cda318e3223410
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    73064 35945a4de11a4927448880d441936319
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1271098 3871bd54d9892c66fa072b11b23f20f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    58398 03084628ddc86cdf90499e490e1482f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    22216 0bd9e6e3003a4c6ec4ed8e2958af3305
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    29364 8bb827c06f72358c9e198ab9d2e21ab1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    62202 4e33828f4d30b055bd7328ef26e7119d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    34966 0876549f10809902c91fdd898342ffca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   248890 7e8ac8e3b285da4bf4f570078661ecbb

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    18670 46253f05423baae217a77160929abd1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    43956 04e007efc1890407d07ac6db7d6efe41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    96878 230db298e7a1af1773d06f5fcf7745c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     2280 e90a29eb6bae1b4eb30271de051187af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    83574 7da2f3e4a347d27d0cd5c316a43ef196
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    33136 722089975c4f881930a70533cc1ce490
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    41918 84f609e4f4a029aab7f8728fd7babedb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    68232 cfe7f9a0406ec1c6244749c5f4f582c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     5366 8891bff0625e8fcb31b03f309ef678b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    31132 34374bc39969804a5c59209c58f56ad2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    51410 4373ea79416b9221cf1bcd44e71734e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   123396 99ab00e2239c416f8fc9fff3235c73da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    42476 67e415fab7cf9a045a9e7e1b008da27b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   110270 8aeefdd52c20dcbbce5ee5e14ca42473
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   239822 55a7a43e374397c6f393e9f062f8192f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    86178 0f83056aad3dc95fcb3e33020999ef46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1418110 018188f299f0952cc08b877f938ddf63
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-386_2.6.12-10.34_i386.deb
      Size/MD5:   802606 fcb043d7a33501068e4db792098aea22
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686-smp_2.6.12-10.34_i386.deb
      Size/MD5:   798106 3bc7ed5bf0e1892370a13432b6665f79
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686_2.6.12-10.34_i386.deb
      Size/MD5:   799908 5015cdbb03ee892e169b86d2cbdaf5bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7-smp_2.6.12-10.34_i386.deb
      Size/MD5:   798160 108f5c8dbdbded4f40e2c9149f265960
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7_2.6.12-10.34_i386.deb
      Size/MD5:   800472 13139f5630a0f4bc3647c2e7ecf0394e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_i386.deb
      Size/MD5:  5929346 15140ae5024da8dc9a2dc68bdbdc7853
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-386_2.6.12-10.34_i386.deb
      Size/MD5: 18026476 d47beaccd8a495c3f07423250c79047e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686-smp_2.6.12-10.34_i386.deb
      Size/MD5: 19368024 801e45ab6d3046734ec6e8fd0ad36190
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686_2.6.12-10.34_i386.deb
      Size/MD5: 19464046 64ec6ba5515fd363a4a27d13a1799186
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7-smp_2.6.12-10.34_i386.deb
      Size/MD5: 19500468 cc6b7b5f0fdc81f7c87616f9d077e320
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7_2.6.12-10.34_i386.deb
      Size/MD5: 19545538 413f75daca580466b82a9b49e22c26a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_i386.deb
      Size/MD5:  3510544 92a8ac5f1b52e752a23882a779ebf610
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    14530 b9c76cba4a838d75ae05e3db8f189031
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   194796 5b73a43d75060dd3f79d7f8316b2f693
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   166500 486495a8bc366a19e76c47ee9046f7b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1048168 1a25213a44f78a8b3edbcb052bd294d9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1341408 1d298a9384d1e31f47d7382d3d0cdea3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   123680 f2098f477c0b4e9cf05b1b2f881e3c6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     8246 fbafff5c5134ac026b69b5636e5d5e0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    93378 94cff703adbf87a0f3b61c227b67b43c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    46820 14c98bda4ed3afc6fa22604a31aa8121
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    29774 ac0cc81646211e9717872143c062431c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    72282 49f7b2672f23a07a9dc566492300154a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     4258 306b5328546cc534669e40fc26140d4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     7666 fa9b8a7958e9409c86985ba3bd851b9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    50622 24b55801b2f2de3bfb139edcf8058d51
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   108634 d3f9edaafdd574f7bcb892e818ca4735
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     9806 6ce1cd2142ed99ed592ea4fc0d96c3cc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    67636 2fe3b7f78eb11cb765b31fa8415ad867
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    70182 e47a757a3f27a84d3a068acdce1637e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1481126 b53e9c227b521fe4473c5ff01ab6cece
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    55208 1789fe70b41328c793b1771a40cb8913
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    20352 20309045486b79420bea54c61efb8616
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    29912 98f21701e784726f0261128365dd38e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   111228 b92fe1ecf12ddf979ed48dee47d3bd7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    34562 b4fc511cbcfbf1c33d4030b0da021c4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   263266 74ec9f373022052012de2a16a6a549bf

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    23362 64ec1f12d26bfd20f070fea026e0e4c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    26352 82a929fa11bd35bd54101aa5fed1c55f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    55914 426e2788e1a026c2b1a80b5b2ec13c3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    58844 6e8417a965b3fef7d72f365ddc5b5d9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     2312 625fdf72197c5f7fa3cef4f8e759bc72
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     2514 170397e811d8092082adae16b51d6eef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    29752 ffd91970cfe4cdbc3a0ee33c0968c40e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    34718 42aa122487e67569bb35924368c09458
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   104678 8292475a8160b5f935982b3ca39aba5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   122196 60ac500415ead2787779983c8b9e2f9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40500 18998450a3739e6a9846af9d7588eca8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    45914 eb4e0ed013d8d87a864b732273f9f383
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    28996 94ce95ccff6fcee760062fa36ba5478d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    29934 5abf5e07f1754b75dc4c355dba3020ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   210090 ea30784ce9f1fd689d4553d474af2f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   224774 567f2483f973f53f4abadb5634d7e98d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     6148 2630cac6fa70f627aa9333e93f06275d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     6966 591b5f3cbc4048dcd7df126bf90ed17b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    45168 3f3da16683cd03d8bbd25f1ddcfbf642
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40418 3b77a7053457f4b54b1894719cd8e226
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9792 575d60fb9e575d26c693757f9ebc6283
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    11786 6c0a30ab0cf31a06403c59ed0126410a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76784 7d6ec8c375ef661b9c6e22d1b119e5e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    85196 ea34886aa97c5f9bbe099140a06b12a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   112152 3347adcce6acedec90fa7ab802b931f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   129228 f47571ad7f6d55fe5e4a7f0eff991120
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76744 28c2763e89db8cbcb5969d86f1763d60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    90418 5c1045f51afa993577f9c7934252429a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   140756 dfee46de58f2d21274480e508592c024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   157284 a6b80f44cf6e664f8f9f422a9f874c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   306088 df9ea1a468cc71b6377ebe4086399e58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   210720 86525b53657fc9415129e429c4fdc337
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   110782 ebcc06f4a57efac4fc5d4a67a6a889b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   116650 8c5359805d7ead36db59d575a7f5b8d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1976510 bde3db48436b88952f3d11b0c4faaa45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  2350458 447efc5e01c183ca0fa80cbea880109a
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-headers-2.6.12-10-iseries-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   773920 10213d665ed315bbc6092333d40fcf1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   782804 624a039969962e0a21a830a8cece6899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc64-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   800732 785f06fca97532b91d7357a23a432309
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc_2.6.12-10.34_powerpc.deb
      Size/MD5:   783272 4605c8ebdac7e78b61c29643068755b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_powerpc.deb
      Size/MD5:  5937076 18e2574387ddb85392ac3a12235a6f54
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-image-2.6.12-10-iseries-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 19521394 20464585c5cfa6a8fc1670a6e89f10a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 18358580 4262cde31e55150664bb501635557169
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc64-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 21186426 b2c5090bae7ff88da6fde238d9f246de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc_2.6.12-10.34_powerpc.deb
      Size/MD5: 18006446 adb49c6a5bd73a4cd152087feb36eef2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_powerpc.deb
      Size/MD5:  3511906 d15ad4372d829ac80afae83ff805e5a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    17620 1733c726a1a5959654b968236d9a12a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    17786 94d7b2c8d885e1351f97105081670afb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   234110 be049e3b463e57b26ac9a221e0051073
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   258856 3e261360233d9105059a2339792e057c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   208854 4184a5925174591fd12cb658164ca8e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   235402 7409019e891d013e701aa0a581e27c2c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1048262 3c1595317b3062fa31adc54be528740f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1048452 81dfda3c9cf1ac1aa4e4cc3ac3d81360
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1457996 bece9fc2948192cfe95ab42597fa7d4d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1623022 9c050db9a4caa649739e7f59208c5cd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   212810 1524118652212f65d20f8d65c6afc16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   197970 1fd46fa3d4f1b6a0d74109b3adcd21d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9462 fc5ca3c3a93a8b74b7ed16d16b9fe92e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9060 2dc94cde22220e0c2e07d0187685af3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   115324 5cf873d1484b00c0d2ebe69f6b0e7db1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   134454 076ffe576e767b20494a2d78242a4714
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    77020 e51db9b034ce39b8af53d7cafca8335d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    87530 9e5befe810a56cc3f2e415c445b5f1c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     4812 cb1f792315833bc74cd5aba4efed179c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     5286 b2c1e5d48dc27772553d4a1c9d74dc47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    63050 3cf0fe7152cd05505c3c232dd64b1864
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76008 c5c25f33a7d43a905ad4ca329a2cd5af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   128626 9b35a60f1ec3a7ce212effcfd3280ff0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   164360 57dc98ca56df1946eb90bf221a4b3f9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    77430 34b0aad78bf32c74dba7ec5c277d0c53
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    98154 6d443efa2e82993e93fb368030264ce5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    85238 3ade6cb5c6ce17dae4b19eb5e320d1e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    92326 f01b4d714601784f8a61448ddc9119de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1537866 8ebd1ed508ab39b4342f443e9e6dec1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1755650 48d11d813ec0190d14d451668556a8a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    65294 c67db2fc2166eb858615b2fcbe19afee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   100434 388f35e6576f9efa9ea2d4beba03b7ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    22886 47547ea2ec62282f3c474e6985ead2a7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    28604 31705f1d1757570ad82004f1d86af521
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    35496 6a076f2a615b0a081a3a414a180b6fac
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    39802 ad4a6fe837c1c13f1cc1c08ad2291ac3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   139882 d9146f734ea9b6e3c123b357f1b77140
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   152636 e9c8ca6da057acc2be24e97902226dfc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40960 14cc612a1d4ec2229c0fd5b99ba50946
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    44426 cfbb4ccdff54becd8a94f45979c88d4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   296160 da32b18c5aeb077081180ebf8a330d5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   324194 c3994807d7fa8f88bc24db36c5519aed

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43.diff.gz
      Size/MD5:  2079780 b9f583cc6afdf2977c8b8eae28b5f440
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43.dsc
      Size/MD5:     3019 66ee7ff62ef8b71dd20d647fa873725b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.23.dsc
      Size/MD5:     2895 50a5cb7ec78f77fa764829c7a3753b67
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.23.tar.gz
      Size/MD5:    25216 9952710cccca0aba2a75fca926596389
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-2.diff.gz
      Size/MD5:    87047 2a3528df6d0169f3d8cfca46bd1ef2bb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-2.dsc
      Size/MD5:     3190 0306c9ec6aa2cdae0cb334ac91566711
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11.orig.tar.gz
      Size/MD5: 97566445 8bb235f9119aed52797b057827756b8c

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-25.43_all.deb
      Size/MD5:  5154730 5cd462491c50cd8ee2c7dbc911b22fcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-25.43_all.deb
      Size/MD5:    85762 418b47578cd3a7729aef8e45b93a6f7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43_all.deb
      Size/MD5: 44459586 a265911f19b0f2ee0613e73e7cc765f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-doc_2.6.15.23_all.deb
      Size/MD5:    23308 255420b11a34aa739ef00e860bd43cab
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.11-2_all.deb
      Size/MD5:    17742 3f9c1648c83b0fc47978eb38a63b437e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-source_2.6.15.23_all.deb
      Size/MD5:    23338 fd9604c438a2e39022c5f0af7e93b508

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    22134 ff67a9629440c827c398e0e79fe12ecb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    44754 2019c1dcecf960ac20b3ed8df3592bcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     2306 d55926f34c8dbb464933e3c1afb71ce7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    36182 fab255d4f6c1afa79de9c1d9c67bdbe1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   102028 428ac80eeb1d1dae1a8a94b3ea843e81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    38616 32a5aa329626d31d79b0fbbb822d8a3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    49124 9e0d33a6b7c9c563212fb2951eddea01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   176744 62cadc976b86e84249a7047e6fcb0176
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    36760 997b87b399c420cc2f0f69424716763c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   142154 9d002e9f1a6267296400452211c3a1dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    51006 e199e786ad81e0413ace74311e27089c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   140422 589745ed6249cc83af7262d24a199075
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   286882 272a18bb84e98868173c1a3fedf6639e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    97792 928ecaed0b6a0c3d45815015787470f3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1643610 25e6fc6e89fa37d3866010a3b9e5dbe0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-generic_2.6.15-25.43_amd64.deb
      Size/MD5:   857810 5d53ad23b33464b240b8f7f6ac76590c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-k8_2.6.15-25.43_amd64.deb
      Size/MD5:   863364 98c8bc48305c0d97d5341b262256b0e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-server_2.6.15-25.43_amd64.deb
      Size/MD5:   862374 0bb2ef56b038415b9d7482c8dbcd8c0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-xeon_2.6.15-25.43_amd64.deb
      Size/MD5:   862206 77285b205416fdccbb0b99c372688a33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_amd64.deb
      Size/MD5:  6906656 55350a0c2a37a2d55c0c68fb18efcf3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-generic_2.6.15-25.43_amd64.deb
      Size/MD5: 20711310 674643934508f7ef93aaa85b7b13be1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-k8_2.6.15-25.43_amd64.deb
      Size/MD5: 20686212 ee34b40249f31deecc57256c959bdc6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-server_2.6.15-25.43_amd64.deb
      Size/MD5: 21531804 a1f885449635fc0d13b4211eabc97130
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-xeon_2.6.15-25.43_amd64.deb
      Size/MD5: 19806164 cede5e9bb4229aecd770e63391f2c676
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    15622 6c3298db44af9be7c2d1b88630b16f2c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   240272 be9bb3fd65a9a4e9f0d036c64c3ab5e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   202564 677f7025f079a9681d13975992594dcb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1048592 ae4e13a42308218cd9c37ad54a0c9b24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1432248 13650fd19387cc9b339ba3c1f3831c13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   161568 b01436219f7ef600146571056022650a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     9826 547b5f3f764f0a01f16f7be313d2be66
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    80862 8952b15f4f74661cc19b1db892ffad14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    49168 92cf2c75382f40b416ee1980968db272
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    35146 9ea1f20e0debd152b80d5b17b1a42d74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    70874 cd190044b6440a1ffa143b8af3e21614
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     6218 35c6d580bbc812ed279c1757659621fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     9052 b25e260615531677f896dc1ec9a71f01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    57880 8a18e4dd75097bcc895ecd40cbd63030
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   123320 c3934fa49d6596a1cd6993eb122215bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    92180 3cc4403a41280e3f52e319757c87aa7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    79208 b8c6d0361eacdd8119c48cfcd18dbc88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1595700 1d565ff7a193e4ec3f8beaafd5a21e19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    72276 995d2c3d79923d1c51efd50ed3dc9bfd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    12644 b09ce59c7cdcd98daf9f50cc3bb87530
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    33732 98d90b38c588de131651837012eebad4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   138184 b1525f07454e4194cf363148a7258da7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    38862 f2e4bf9c1a7a8859ac96d962dd9f0dd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   278740 b58470959c82549f4beb9de5703c154a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-25_3.11+2.6.15.11-2_amd64.deb
      Size/MD5:   474866 949a50b0afdb59c4435d8002847e303e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.23_amd64.deb
      Size/MD5:    23370 e49f383977fdd6657519d810b607d899
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-2_amd64.deb
      Size/MD5:  2404872 8d1116108b85c85a6a15384a3d3286c1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:    76052 85c23cc1cea393a31a4ea7e903b9b33f
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:   510186 e4d5a3e09213b00e4af48ab3a72d797d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23374 8783b4eb94d35863b6b23521ea8800bd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8-smp_2.6.15.23_amd64.deb
      Size/MD5:    23446 bc2a14958ed454a956dbc24693694e3f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23376 1d0c6f32cc7c27867e9c79681612794a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23360 d6f1b5d1861bbf87888c938487909613
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23374 727c695add46d900405a8f567b96bc5a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23360 d76862c34b4a4b99512328b6ddbc23fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23368 83daedb2b7f64937a72f92e20edbed59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23362 7a92d965e6cd2aef070fa91de991bb47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23362 d9081edb52550a76a17eb658f9920eb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23356 ed64d1150e18a54b15a56e2cdf228b61
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23358 a4b030b97384c5d543a03e4261416d77
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23356 73fcce335996d8d1f3c29bbe806dc319
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23356 0aa9f2e1f5cc7ba2007aa9834b823369
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-generic_2.6.15.11-2_amd64.deb
      Size/MD5:  6861066 5334e0046eff3f8041e8e0511c43b805
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-k8_2.6.15.11-2_amd64.deb
      Size/MD5:  6860570 9eed4452dfad7e8cc18341eda36a6a6a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-xeon_2.6.15.11-2_amd64.deb
      Size/MD5:  6837408 cc2866d6b856259d053aadfd640f1192
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23386 587c9676bf28a8e1566909ea41280ee9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23390 98ea001744e627d489a2c2bf1ae19dc9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23386 b70b8ace9c1f40c8a982cedfdfb770fd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.23_amd64.deb
      Size/MD5:    23322 b701ac0c170731f8d0f1d4228ace7361
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-amd64-generic-di_2.6.15.11-2_amd64.udeb
      Size/MD5:   799520 3768c1fad61bceeac1a91b1e57edf577
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-amd64-generic-di_2.6.15.11-2_amd64.udeb
      Size/MD5:   497768 097a2c35531e637f747afc8899861efc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:   166006 0dee1273cd970ca7739f0d9270b72b39
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:   161600 30f6fe642174f141ecd5607259b0e3a8
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:  6070426 10cab4b65ca1bf77318b99eef5432887
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:  7320164 eab467f972d6d33a0dd2e75143a504eb
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:  1758336 8eeaca383a0c35624fc31c518dbd2164
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:  1405544 dabb643a583e5f5b37dfbc3d025edbba
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:   125124 5a92263171f05d6e169472be5c2cf1f3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5: 17296342 8664077d25232ab74881ef9da4870ac4

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    18966 4db259dfa66d1af8e604c9bc1512f040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    43454 9effcdb9937fd4af0a82efa3f43cce6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   105200 8ffbf937fa2c397357e645d345339e4e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     2280 c4a7e19dbd64dd628279a74ace5845e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    34476 62a17c898d87177c4821b17431ef265b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    96794 e425aa8735407916fc42468f1d1ac4e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    37066 d34c160aa30e4d0a0a4973b33b45cde3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    44074 4ac2d0e974efd03522bb70d214907e74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   167672 fe83fda8fee0bdb5ae28dfeb272bb155
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    33926 0c20183403740be26aaea3995804b0dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   137794 3bcd8287178447c6e27fe2e889677310
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    46846 4a9b7866654878153875839b265afdcc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   132754 6832ef7eaa4940258a1886120583aebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   273640 ef5113efdcf6214c9d8f7c8796d35253
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   102252 eddd6d201b83bfb58244b452b51d4416
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1594594 1fcc8bc908bc9d51ed34d604f28c0baf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-386_2.6.15-25.43_i386.deb
      Size/MD5:   852348 098f1592bb44875107ebadb7085e8faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-686_2.6.15-25.43_i386.deb
      Size/MD5:   855314 837773d2dbdbfd93826d19875a6b7ef8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-k7_2.6.15-25.43_i386.deb
      Size/MD5:   853532 bedb504f1918aaddc6638fd6c2ece0bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-server-bigiron_2.6.15-25.43_i386.deb
      Size/MD5:   857216 801415bfea06f758b09aa6a62b4d144d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-server_2.6.15-25.43_i386.deb
      Size/MD5:   855348 82df02173953f35a1d2cd93923c06693
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_i386.deb
      Size/MD5:  6898992 6f551f5f98d585d1159f77a46c021ead
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-386_2.6.15-25.43_i386.deb
      Size/MD5: 21617016 6eab13de38c2a833941274fbc52e1cfb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-686_2.6.15-25.43_i386.deb
      Size/MD5: 22400042 f223520f53102dd8d8f946d9d0c5a7e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-k7_2.6.15-25.43_i386.deb
      Size/MD5: 22145868 e881960a141dcea275beaeab23c58a56
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-server-bigiron_2.6.15-25.43_i386.deb
      Size/MD5: 23510198 6661359218f8410eb7ae9bcf7f0ac713
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-server_2.6.15-25.43_i386.deb
      Size/MD5: 23061696 d5721fdabf7d83a64c9448e1b52f3a64
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    15496 56f9f923e4576db341f4af69675eb164
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   238434 96661b9d0051bb19647af21210162ee2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   196962 af18e6ff73c5edafb60a25aec076c4ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1048386 50952c3c8a187ffdf7c3ff203c3f5541
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1631532 7c1efa5d87752482381c0720072a07e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   160754 f17a1fc9525d89993b8b6de8f94c4b74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     9158 199e9b6c1e1c6fc7115129b200ed63e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    76482 7e7b46454225379d4722dec8eaaf8a76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    53248 ae0df304ab4c7d7dbafda1882c56765a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    33054 609720e4943ab874577eac0c94ffb62f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    85616 cbd3e65a77c3b70a3e0f0d5fa23cf34e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     6024 ac12c96fb84f6c807cc15c6d8f08089f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     8754 32410bbac3a6663f1d108f7c13027e4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    53594 94b6411e5a9bee1e5edb8e574037b7b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   130776 5c39088787f8861437c46401aaa04885
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    90358 087190d72686fcda50f17aae9343eca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    77114 fda8eb92686515697c22ef29b1292396
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1769690 30f3dfe372b6a5a8ba29d4428f7a728f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    69556 da87db3cc9d9e70b50c2dbded564c300
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    11758 0a89a1c85ad41a6c1282de9767e0ba7f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    35998 db5df0db601e6c87e8a8d3e2707eae3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   132280 7a7f0954fb7006cb1b0a0ac0e25f0742
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    38464 5bfbc46a68c0fd83e39071ab0d29d9cc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   299114 02f56acbf7c35cef132423589640553e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-25_3.11+2.6.15.11-2_i386.deb
      Size/MD5:  1204376 ee383fc8c7bdccd9b7f1735c2c9585cb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.23_i386.deb
      Size/MD5:    23374 98b6f289aa92b3e554fae20ac764d85c
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-2_i386.deb
      Size/MD5:  3692380 70b73c1754b364a087255396f57f7047
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:    72956 b3fda82fd1880c6e29a1517b021ecd4e
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:   660264 1e075527c2fcacef72985cb8f29447d3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-386_2.6.15.23_i386.deb
      Size/MD5:    23350 b655a17dee05f2aa9399d8f2fd435297
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686-smp_2.6.15.23_i386.deb
      Size/MD5:    23450 095e7e9e2a35d20dc67a6143ef82b1e0
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686_2.6.15.23_i386.deb
      Size/MD5:    23382 5ec06667b2fe0e7d83514089afaaf605
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-386_2.6.15.23_i386.deb
      Size/MD5:    23336 4d9523269cbe8f1d51b80ffd6ebb52ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-686_2.6.15.23_i386.deb
      Size/MD5:    23368 9d033035e09fdd91aab6dbf0c8fb3e52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-k7_2.6.15.23_i386.deb
      Size/MD5:    23348 6d82b0b953616c538170f08025543f8f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23372 4566452a28e86a21540f6443e7800600
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server_2.6.15.23_i386.deb
      Size/MD5:    23360 1533f68d19639e1314dd69286bb9f75f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-386_2.6.15.23_i386.deb
      Size/MD5:    23330 eaf3bb4eadaf10c3c38e8cf4d96e0322
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-686_2.6.15.23_i386.deb
      Size/MD5:    23364 d45bc99c1899276c84bb8186d88e0912
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-k7_2.6.15.23_i386.deb
      Size/MD5:    23344 fb4fc12a5a39baed75dfb822c415d02c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23370 837ffc0e9458051da0d9c6dd42b05092
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server_2.6.15.23_i386.deb
      Size/MD5:    23354 4b70065bb5de55f807339e9aa90953fe
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7-smp_2.6.15.23_i386.deb
      Size/MD5:    23430 414373d5a5a1170a44ce2665f82dabb6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7_2.6.15.23_i386.deb
      Size/MD5:    23362 c55dbba4c7f3355df2dc9da175983a83
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-386_2.6.15.11-2_i386.deb
      Size/MD5:  8137568 b60396e41728f77729e34d884f0fb61d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-686_2.6.15.11-2_i386.deb
      Size/MD5:  7939206 a9f9d34163a391f3fea63bc6d759554e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-k7_2.6.15.11-2_i386.deb
      Size/MD5:  7937984 737fd0a53873751c8ae6ce424cbba6fa
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-386_2.6.15.23_i386.deb
      Size/MD5:    23364 97b7d4b0ccedcfb481536e844e9944d3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-686_2.6.15.23_i386.deb
      Size/MD5:    23398 61c0aaa00119c783ab90bd8a3931dec3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-k7_2.6.15.23_i386.deb
      Size/MD5:    23378 80a80ee871b8de8d5a3b0b1c5dd50fe1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23370 01225ea4914bf6b037586bf3e0966c02
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server_2.6.15.23_i386.deb
      Size/MD5:    23352 73c9fa16752ef9105ae764b5b0b0dac7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.23_i386.deb
      Size/MD5:    23322 c6b100db3aaa730cf73c4490bd5ca12c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-386-di_2.6.15.11-2_i386.udeb
      Size/MD5:   799338 5a980a3340d617887f12c930f3a44483
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-386-di_2.6.15.11-2_i386.udeb
      Size/MD5:   475488 83de1b5ed76ee9cb716ac1854d25e636
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:   146740 25d0c45b1ecd61a8d64c8aff51f5a5d6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:   139692 e138399a40736b887208999c33c6cbcd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:  3060002 8338965631496ecdcc36d0f5622a8f01
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:  4058936 4c6f353d50ea4c3e3cf053e06290c5f6
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:  1693126 63d722c7baa07046838dc010d29bed3b
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:  1401342 33b172c4c67772d6ac6aabf9b340a61b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:   110602 39c05f985f7d3faa169e0174bf902d7e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-2_i386.deb
      Size/MD5: 10556804 4263979c1848292869c4d6510fb98939

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    23730 7faee7c638f34242a10a3e2c9e8e827c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    25940 7ae430079f8de538734a1917f0fa4ebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    49290 692e08c8578e3af785c97270c051ce85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    51518 1b888b41b618d4548c31c7b2f055d6e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2300 5cd4ce64af230c533070d82f38b1a7ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2476 a68a02505219f0ded4c523d5360ba251
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40116 7009389eea11a821202b23839918565e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    43680 400bb6f10e787141303d76693f2b84f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   112348 f933eeb0cf2dcf72372cfc4d804c008e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   120436 72831068a1fe03c280d1162a48dd07b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40848 63282d28ffe5ff27424896541002735c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    45340 182fa9becd9aaca3be5a5c514fb5181a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    29024 b009956289b247a1228b60c989c88a2f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    29896 e094885841aab990e1b130a9e720c598
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   211388 54750fde9a763f2a01f62d55b5bb574e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   225200 dd0c7bf901a410e42e732f78edf89388
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    45042 593cd5a0545cfa96da3a20b71f0acee3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40212 26404f5a683f0fa91b8b4e9db1b246f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     1928 253d3f8daccae2b3b2e154f680539694
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2198 5122db987b8302605f5475e235440825
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    80590 f2e9b3dcb39f166ef5782a31370b7d1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    85942 bcb8a9300422dd2bfffacf3139faa909
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   111616 7258a4971a55232396a6bc1e91241a36
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   125742 2a28587128c7d651af4b9dde9362bd3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    53354 0d8d0bd87be4aac9773fc592f70111d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    58460 9a2e42b21b9aba0a50ab6abd708be275
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   147648 6bdfc456aa0f68b90c525bf6b15c1ab3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   161432 7cfcd9691b10c9c077b11418aad781ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   317558 d2a26e66cd6842fa1d63300b13c04ef7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   287648 406a545c9ba766dc7cb24082b2c3a482
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   115848 c751a0d23abd4b64543274c493c37115
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   116504 8fd087f1bcc466e17b9f2760f83035e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1922480 6b8174ee79ad890c64ae95938410232e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  2425262 0ce7eeca8abdcee675772eadf1a5aeca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc-smp_2.6.15-25.43_powerpc.deb
      Size/MD5:   865852 2da28f0985e5952dc12766b962f36ef5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc64-smp_2.6.15-25.43_powerpc.deb
      Size/MD5:   857492 b548be24713af5884601808c23c00d58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc_2.6.15-25.43_powerpc.deb
      Size/MD5:   862646 34b20d1dbb695c35845b8be539e20829
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_powerpc.deb
      Size/MD5:  6930880 962055cdefb409ec8ee7b1c48ba3d1d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc-smp_2.6.15-25.43_powerpc.deb
      Size/MD5: 22654004 e13307b4c56dc2b876e9d304a421ae42
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc64-smp_2.6.15-25.43_powerpc.deb
      Size/MD5: 23539726 c4f00a3e4a1c2bfe0bf6c7855e0226dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc_2.6.15-25.43_powerpc.deb
      Size/MD5: 22239368 6e6ab2e662fa6ae523405b3cdbbf5b75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    17778 81083046a3098eebd7c8cad5a0faade1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    17380 cc27dffb7e1a52c71356d1e7b257bcf2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   261136 e7086a2889516c7d17d102f071b56967
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   282374 2a1f96e6985f667e6d885837d1a41a8e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   227450 3fb1cd1ea3d9f94fc1455da97fa2da99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   248680 aa8403e20976904b3353011864874b3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1048440 daf2d76379b29cb0d541017b2f798f4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1048604 822381057586dc85380674677dab1472
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1613952 83bd870b39d0969db2be991abdc8b93d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1742986 77eaa8d11058dbd0fc402bf0bea7c9f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   250840 f67a8c3647698c0105b6428c828d3eb4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   233590 25447e00f3583bb849ea493d38dddd5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    13030 5d5db387c0cf26a48427e686683a89b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    13518 eb0d22b53f99574edde2180d74c2e521
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    84830 e299c3344678891b0c15f5ebf8cd098a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    52200 698e0e885c08001128cac795580adee8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    73926 155a5dc4793be655c294a7f3d39ec6dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    85838 7b22c39eaf37f1e41498cf0cbf8540c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     6616 f6de3fe070052c2e50419f2fff5c0fc5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     7054 6e6f1d3af07a422e64bc554551100e92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    60350 701daa37b28d00b407fa76e3abbd5740
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    70340 0440e15199b7848c8ed61b2bdb2882d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   128542 f8e34a52912d5285f02828b13584f696
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   157792 5bab493344ae46a9b3df7f3823457725
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    98860 d83a7feb0ef659e9bedcc26df0cdd16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   113410 00bc703b6709c348be439bd11c46802f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    87246 0c171f3236189675b9a696d6dec2875e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    93266 003e03470d2abf5f01828e9ae9c10a55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  2014976 fd00a281cfb41f77750e0255fd79e7d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1988776 d4aac0add83d73b30ac16c41c515d4eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   104106 f17e7d666efae605490b74ebbcbf60b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   115712 45b06381ddb0439d7a990d558696ad58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    12738 cd2457f9a71129d5562e43953210bd94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    14438 6ebe59fa0c35ca85961c2c60a729e862
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    39944 46beddacbcaad812036ea2ae83304870
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    41474 4babf9e0e3e7045118381a2d41f69363
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   148956 f0ebd53c68a7506531dcbba82c6f2056
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   167576 e4814de3fb38a5ca3fcc3cbbaf6c165f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    42180 753e03b346c615d74bca769f772a170e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    44782 51e8b6f55b5079d70b780dc76e1455fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   320286 901810126bfdd12898079fdfe42afb1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   324708 66d39b3869725a185b9820e6556b48de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23460 19544e6b3fd48111ff45b92fb27ee30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23396 fb1f77bc33f02624a0580aafbb359f0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23458 b9115c2bf2f8d0e47d7000dd027fbbe2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23396 27d848a39bd8608ba14526ba09e79730
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23416 fdf9ff4efbafe1dcddae0ca84c58e42c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23426 552617cd354016e19d22cde094c27f54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23350 4574c742184f09feeabeed2e5d98d67b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23458 74669c0c3c5defabab5b56954a316dee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23388 95289d6bf39c291a518d4c5806d50f2d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 7684c29de740fa27c98c4a5cbc1366f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23388 afc3dbdd9891df599e390190d3450e21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23414 52179494e250d129fa119985beed1f75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23420 d6e5aa0c0dc1a12a82615c7b8ba5c98a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23346 66877044add2d0aebbda7a184535881a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 2b45943741dd7af5aa6a0d7463b42d73
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23390 ea3dc64d743738a893d50f3cccb9ee0b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 e60ce27af7998255a7fc39186088294c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23392 0eac7d5aef3e8d4c0e7f9b7dbbae28ca
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23428 6c94c32784b35b16ca7dadee22a7991c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23424 9d353b900b956b53349b82db5464bf2c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23360 6baaca22ebf1de91a5a19c1cbd2a87db
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-powerpc-smp_2.6.15.11-2_powerpc.deb
      Size/MD5:  1339334 524f7410c1746fe27fddcd5f73dafcdc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-powerpc_2.6.15.11-2_powerpc.deb
      Size/MD5:  1335366 7eab1b03ae6f0caaf8f287eaa15c95ef
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23444 a21dee0187c0a9859209ddc35641d978
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23376 4def5627e2af081233ed55275afb0dc9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-powerpc-di_2.6.15.11-2_powerpc.udeb
      Size/MD5:   799410 8d4e004017a5b30e7cf934a71a5995b2
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-powerpc-di_2.6.15.11-2_powerpc.udeb
      Size/MD5:   508178 7b08d3eaf48e07a05288d1ac9d1678a1

    

- 漏洞信息

25744
Linux Kernel sg Driver Dio Transfer Local DoS
Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-09-20 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel SG Driver Direct IO Local Denial of Service Vulnerability
Design Error 18101
No Yes
2006-05-25 12:00:00 2006-12-18 10:38:00
Ahmed Teirelbar discovered this issue.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server 9
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.12
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.4.33 -pre1
Linux kernel 2.4.33
Linux kernel 2.4.32 -pre2
Linux kernel 2.4.32 -pre1
Linux kernel 2.4.32
Linux kernel 2.4.31 -pre1
Linux kernel 2.4.31
Linux kernel 2.4.30 rc3
Linux kernel 2.4.30 rc2
Linux kernel 2.4.30
Linux kernel 2.4.29 -rc2
Linux kernel 2.4.29 -rc1
Linux kernel 2.4.29
Linux kernel 2.4.28
Linux kernel 2.4.27 -pre5
Linux kernel 2.4.27 -pre4
Linux kernel 2.4.27 -pre3
Linux kernel 2.4.27 -pre2
Linux kernel 2.4.27 -pre1
Linux kernel 2.4.27
Linux kernel 2.4.26
Linux kernel 2.4.25
Linux kernel 2.4.24 -ow1
Linux kernel 2.4.24
Linux kernel 2.4.23 -pre9
Linux kernel 2.4.23 -ow2
Linux kernel 2.4.23
Linux kernel 2.4.22
+ Devil-Linux Devil-Linux 1.0.5
+ Devil-Linux Devil-Linux 1.0.4
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Red Hat Fedora Core1
+ Slackware Linux 9.1
Linux kernel 2.4.21 pre7
Linux kernel 2.4.21 pre4
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
Linux kernel 2.4.21 pre1
Linux kernel 2.4.21
+ Conectiva Linux 9.0
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ SuSE SUSE Linux Enterprise Server 8
Linux kernel 2.4.20
+ CRUX CRUX Linux 1.0
+ Gentoo Linux 1.4
+ Gentoo Linux 1.2
+ RedHat Linux 9.0 i386
+ Slackware Linux 9.0
+ WOLK WOLK 4.4 s
Linux kernel 2.4.19 -pre6
Linux kernel 2.4.19 -pre5
Linux kernel 2.4.19 -pre4
Linux kernel 2.4.19 -pre3
Linux kernel 2.4.19 -pre2
Linux kernel 2.4.19 -pre1
Linux kernel 2.4.19
Linux kernel 2.4.18 pre-8
Linux kernel 2.4.18 pre-7
Linux kernel 2.4.18 pre-6
Linux kernel 2.4.18 pre-5
Linux kernel 2.4.18 pre-4
Linux kernel 2.4.18 pre-3
Linux kernel 2.4.18 pre-2
Linux kernel 2.4.18 pre-1
Linux kernel 2.4.18 x86
Linux kernel 2.4.18
Linux kernel 2.4.17
Linux kernel 2.4.16
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
Linux kernel 2.4.12
+ Conectiva Linux 7.0
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux kernel 2.4.3
Linux kernel 2.4.2
Linux kernel 2.4.1
Linux kernel 2.4 .0-test9
Linux kernel 2.4 .0-test8
Linux kernel 2.4 .0-test7
Linux kernel 2.4 .0-test6
Linux kernel 2.4 .0-test5
Linux kernel 2.4 .0-test4
Linux kernel 2.4 .0-test3
Linux kernel 2.4 .0-test2
Linux kernel 2.4 .0-test12
Linux kernel 2.4 .0-test11
Linux kernel 2.4 .0-test10
Linux kernel 2.4 .0-test1
Linux kernel 2.4
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8710 CM 3.1
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8700 CM 3.1
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8500 CM 3.1
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya S8300 CM 3.1
Linux kernel 2.6.13
Linux kernel 2.4.33 .1

- 不受影响的程序版本

Linux kernel 2.6.13
Linux kernel 2.4.33 .1

- 漏洞讨论

The Linux kernel is prone to a local denial-of-service vulnerability. This issue is due to a design error in the SG driver.

This vulnerability allows local users to cause a kernel panic, denying further service to legitimate users.

This issue affects Linux kernel versions prior to 2.6.13.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Linux kernel version 2.6.13 is available to address this issue.

Please see the references for more information and vendor advisories.


S.u.S.E. Linux Professional 10.1

Linux kernel 2.4 .0-test3

Linux kernel 2.4 .0-test7

Linux kernel 2.4

Linux kernel 2.4 .0-test11

Linux kernel 2.4 .0-test4

Linux kernel 2.4 .0-test1

Linux kernel 2.4.1

Linux kernel 2.4.11

Linux kernel 2.4.12

Linux kernel 2.4.13

Linux kernel 2.4.15

Linux kernel 2.4.17

Linux kernel 2.4.18 pre-8

Linux kernel 2.4.18 pre-7

Linux kernel 2.4.18 pre-3

Linux kernel 2.4.18 pre-2

Linux kernel 2.4.18 pre-5

Linux kernel 2.4.18 pre-1

Linux kernel 2.4.19 -pre4

Linux kernel 2.4.19 -pre1

Linux kernel 2.4.19 -pre5

Linux kernel 2.4.19 -pre3

Linux kernel 2.4.20

Linux kernel 2.4.21

Linux kernel 2.4.21 pre1

Linux kernel 2.4.21 pre4

Linux kernel 2.4.22

Linux kernel 2.4.23 -ow2

Linux kernel 2.4.23 -pre9

Linux kernel 2.4.26

Linux kernel 2.4.27 -pre2

Linux kernel 2.4.27 -pre4

Linux kernel 2.4.29 -rc2

Linux kernel 2.4.30 rc3

Linux kernel 2.4.31

Linux kernel 2.4.31 -pre1

Linux kernel 2.4.32 -pre2

Linux kernel 2.4.32 -pre1

Linux kernel 2.4.33 -pre1

Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test10

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站