CVE-2006-2271
CVSS7.8
发布时间 :2006-05-09 12:02:00
修订时间 :2011-03-07 21:35:51
NMCOPS    

[原文]The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.


[CNNVD]Linux SCTP ECNE组块 远程拒绝服务漏洞(CNNVD-200605-129)

        Linux SCTP (lksctp) 2.6.17之前版本的ECNE组块处理可以使远程攻击者在会话处于CLOSED状态时,借助一个非预期组块造成拒绝服务(内核恐慌)。

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:lksctp:lksctp:2.6.3_1.0.0
cpe:/a:lksctp:lksctp:2.6.13_1.0.3
cpe:/a:lksctp:lksctp:2.6.2_0.9.0
cpe:/a:lksctp:lksctp:2.6.15_1.0.5
cpe:/a:lksctp:lksctp:2.6.6_1.0.1
cpe:/a:lksctp:lksctp:2.6.16_1.0.6
cpe:/a:lksctp:lksctp:2.6.0_test1_0.7.2
cpe:/a:lksctp:lksctp:2.6.10_1.0.2
cpe:/a:lksctp:lksctp:2.6.14_1.0.4
cpe:/a:lksctp:lksctp:2.6.0_test4_0.7.3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10934The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unex...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2271
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2271
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-129
(官方数据源) CNNVD

- 其它链接及资源

http://secunia.com/advisories/19990
(VENDOR_ADVISORY)  SECUNIA  19990
http://labs.musecurity.com/advisories/MU-200605-01.txt
(PATCH)  MISC  http://labs.musecurity.com/advisories/MU-200605-01.txt
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html
(PATCH)  FULLDISC  20060508 [MU-200605-01] Multiple vulnerabilities in Linux SCTP 2.6.16
http://www.vupen.com/english/advisories/2006/2554
(UNKNOWN)  VUPEN  ADV-2006-2554
http://www.vupen.com/english/advisories/2006/1734
(UNKNOWN)  VUPEN  ADV-2006-1734
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=35d63edb1c807bc5317e49592260e84637bc432e
(UNKNOWN)  CONFIRM  http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=35d63edb1c807bc5317e49592260e84637bc432e
http://xforce.iss.net/xforce/xfdb/26430
(UNKNOWN)  XF  linux-sctp-ecne-chunk-dos(26430)
http://www.ubuntu.com/usn/usn-302-1
(UNKNOWN)  UBUNTU  USN-302-1
http://www.trustix.org/errata/2006/0026
(UNKNOWN)  TRUSTIX  2006-0026
http://www.securityfocus.com/bid/17910
(UNKNOWN)  BID  17910
http://www.redhat.com/support/errata/RHSA-2006-0493.html
(UNKNOWN)  REDHAT  RHSA-2006:0493
http://www.osvdb.org/25632
(UNKNOWN)  OSVDB  25632
http://www.novell.com/linux/security/advisories/2006-05-31.html
(UNKNOWN)  SUSE  SUSE-SA:2006:028
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
(UNKNOWN)  MANDRIVA  MDKSA-2006:086
http://www.debian.org/security/2006/dsa-1103
(UNKNOWN)  DEBIAN  DSA-1103
http://www.debian.org/security/2006/dsa-1097
(UNKNOWN)  DEBIAN  DSA-1097
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://secunia.com/advisories/21745
(UNKNOWN)  SECUNIA  21745
http://secunia.com/advisories/21476
(UNKNOWN)  SECUNIA  21476
http://secunia.com/advisories/20914
(UNKNOWN)  SECUNIA  20914
http://secunia.com/advisories/20716
(UNKNOWN)  SECUNIA  20716
http://secunia.com/advisories/20671
(UNKNOWN)  SECUNIA  20671
http://secunia.com/advisories/20398
(UNKNOWN)  SECUNIA  20398
http://secunia.com/advisories/20237
(UNKNOWN)  SECUNIA  20237
http://secunia.com/advisories/20157
(UNKNOWN)  SECUNIA  20157

- 漏洞信息

Linux SCTP ECNE组块 远程拒绝服务漏洞
高危 设计错误
2006-05-09 00:00:00 2006-05-10 00:00:00
远程  
        Linux SCTP (lksctp) 2.6.17之前版本的ECNE组块处理可以使远程攻击者在会话处于CLOSED状态时,借助一个非预期组块造成拒绝服务(内核恐慌)。

- 公告与补丁

        暂无数据

- 漏洞信息 (F48071)

Mandriva Linux Security Advisory 2006.116 (PacketStormID:F48071)
2006-07-09 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2005-3359,CVE-2005-3784,CVE-2005-3858,CVE-2005-4618,CVE-2006-0096,CVE-2006-0555,CVE-2006-1242,CVE-2006-1525,CVE-2006-1528,CVE-2006-1855,CVE-2006-1856,CVE-2006-2071,CVE-2006-2271,CVE-2006-2272,CVE-2006-2444
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-116 - A ridiculous number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:116
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : July 5, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to 2.6.14, the atm module allows local users to cause a Denial of
 Service (panic) via certain socket calls that produce inconsistent
 reference counts for loadable protocol modules (CVE-2005-3359).
 
 Prior to 2.6.15, the auto-reap child processes included processes with
 ptrace attached, leading to a dangling ptrace reference and allowing
 local users to cause a Denial of Service (crash) (CVE-2005-3784).
 
 Prior to and including 2.6.12, a memory leak in the ip6_input_finish
 function could allow an attacker to cause a Denial of Service via
 malformed IPv6 packets with unspecified parameter problems, which
 prevents SKB from being freed (CVE-2005-3858).
 
 Prior to 2.6.15, a buffer overflow in sysctl could allow a local user
 to corrupt user memory and possibly cause a Denial of Service via a
 long string, causing sysctl to write a zero byte outside the buffer
 (CVE-2005-4618).
 
 Prior to 2.6.11, wan/sdla.c does not require CAP_SYS_RAWIO privilege
 for an SDLA firmware upgrade, with unknown impact and local attack
 vectors (CVE-2006-0096).
 
 Prior to 2.6.15.5, a local user could cause a Denial of Service (NFS
 client panic) via unknown attack vectors related to the use of O_DIRECT
 (direct I/O) (CVE-2006-0555).
 
 Prior to 2.6.16, the ip_push_pending_frames function increments the IP
 ID field when sending a RST after receiving unsolicited TCP SYN-ACK
 packets, which allows a remote attacker to conduct an idle scan attack,
 bypassing any intended protection against such an attack
 (CVE-2006-1242).
 
 Prior to 2.6.16.8, the ip_route_input function allows local users to
 cause a DoS (panic) via a request for a route for a multicast IP
 address, which triggers a null dereference (CVE-2006-1525).
 
 Prior to 2.6.13, local users could cause a Denial of Service (crash)
 via a dio transfer from the sg driver to memory mapped IO space
 (CVE-2006-1528).
 
 Prior to 2.6.11.12, the choose_new_parent function includes certain
 debugging code which could allow a local user to cause a Denial of
 Service (panic) by causing certain circumstances involving termination
 of a parent process (CVE-2006-1855).
 
 Prior to and including 2.6.16, the kernel did not add the appropriate
 LSM file_permission hooks to the readv and writev functions, which
 could allow an attacker to bypass intended access restrictions
 (CVE-2006-1856).
 
 Prior to 2.6.16, local users can bypass IPC permissions and modify a
 read-only attachment of shared memory by using mprotect to give write
 permission to the attachment (CVE-2006-2071).
 
 Prior to 2.6.17, the ECNE chunk handling in SCTP (lksctp) allows remote
 attackers to cause a DoS (kernel panic) via an unexpected chucnk when
 the session is in CLOSED state (CVE-2006-2271).
 
 Prior to 2.6.17, SCTP (lksctp) allows remote attacker to cause a DoS
 (kernel panic) via incoming IP fragmented COOKIE_ECHO and HEARTBEAT
 SCTP control chunks (CVE-2006-2272).
 
 Memory corruption can be triggered remotely when the ip_nat_snmp_basic
 module is loaded and traffic on port 161 or 162 is NATed
 (CVE-2006-2444).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3359
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4618
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0096
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0555
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1525
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1855
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1856
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2271
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2272
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 a5f9a1061112afa86f10ec1bdc9d49f0  corporate/3.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.i586.rpm
 edf706536ecb71300eb53c42838dfb7f  corporate/3.0/RPMS/kernel-BOOT-2.6.3.32mdk-1-1mdk.i586.rpm
 27be129a647b32dab207593327cfbdb0  corporate/3.0/RPMS/kernel-enterprise-2.6.3.32mdk-1-1mdk.i586.rpm
 25df51c79bda0995e1ab5e626bed3365  corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.32mdk-1-1mdk.i586.rpm
 9d6f94621c8d02ea4a2378575b9150b8  corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.32mdk-1-1mdk.i586.rpm
 0a15845463acdec596ba4b02e718087e  corporate/3.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.i586.rpm
 6cd61286a7e3aac569186465e6d37e67  corporate/3.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.i586.rpm
 4b1b11ed7ea70b3119eab29783739f06  corporate/3.0/RPMS/kernel-source-2.6.3-32mdk.i586.rpm
 ae918285bd5b813d3dbac4dc180c0d6d  corporate/3.0/RPMS/kernel-source-stripped-2.6.3-32mdk.i586.rpm
 a4632a1ebf83f95f547d266abaad2106  corporate/3.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 cb09cd5187a99ea139bf82783bd184a4  x86_64/corporate/3.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.x86_64.rpm
 139e7d1dedffe1f4f44c6e988b5c4ef2  x86_64/corporate/3.0/RPMS/kernel-BOOT-2.6.3.32mdk-1-1mdk.x86_64.rpm
 f8d744824c238b071eafda67136592ae  x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.x86_64.rpm
 0ab64016fffb13934347e3d5cba2b45e  x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.x86_64.rpm
 437cfd7b69813e44cda4e0fe6e091521  x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-32mdk.x86_64.rpm
 dee29e29dc05f364ceb389144144c469  x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-32mdk.x86_64.rpm
 a4632a1ebf83f95f547d266abaad2106  x86_64/corporate/3.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 3d6ff857e798601ce4cf62c16e29ed42  mnf/2.0/RPMS/kernel-2.6.3.32mdk-1-1mdk.i586.rpm
 94ea4314713ca6a39120a066b9dd9b59  mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.32mdk-1-1mdk.i586.rpm
 694ad7fad48ec9a0b0bdb6a7b1e94148  mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.32mdk-1-1mdk.i586.rpm
 d602f9f1e991794a1cedb21e1b87e949  mnf/2.0/RPMS/kernel-secure-2.6.3.32mdk-1-1mdk.i586.rpm
 c7a984793f0f81d33bedd18eebd34228  mnf/2.0/RPMS/kernel-smp-2.6.3.32mdk-1-1mdk.i586.rpm
 81a4bfaab9d2a45a8500f2741f1db6a5  mnf/2.0/SRPMS/kernel-2.6.3.32mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEq9cGmqjQ0CJFipgRAjRFAKDkoTvT4ht14u+E3EyZYDadNRql8wCgoiNp
ycOpCb9cZ6HIXDL0KeZwIDc=
=5WcB
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47620)

Ubuntu Security Notice 302-1 (PacketStormID:F47620)
2006-06-26 00:00:00
Ubuntu  ubuntu.com
advisory,kernel,vulnerability
linux,ubuntu
CVE-2006-0038,CVE-2006-0744,CVE-2006-1055,CVE-2006-1056,CVE-2006-1522,CVE-2006-1527,CVE-2006-1528,CVE-2006-1855,CVE-2006-1856,CVE-2006-1857,CVE-2006-1858,CVE-2006-1859,CVE-2006-1860,CVE-2006-1864,CVE-2006-2071,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Ubuntu Security Notice 302-1 - A ridiculous amount of vulnerabilities have been patched in the Linux 2.6 kernel series for Ubuntu.

=========================================================== 
Ubuntu Security Notice USN-302-1              June 15, 2006
linux-source-2.6.10/2.6.12/2.6.15 vulnerabilities
CVE-2006-0038, CVE-2006-0744, CVE-2006-1055, CVE-2006-1056,
CVE-2006-1522, CVE-2006-1527, CVE-2006-1528, CVE-2006-1855,
CVE-2006-1856, CVE-2006-1857, CVE-2006-1858, CVE-2006-1859,
CVE-2006-1860, CVE-2006-1864, CVE-2006-2071, CVE-2006-2271,
CVE-2006-2272, CVE-2006-2274, CVE-2006-2275, CVE-2006-2444
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  linux-image-2.6.10-6-386                          2.6.10-34.20
  linux-image-2.6.10-6-686                          2.6.10-34.20
  linux-image-2.6.10-6-686-smp                      2.6.10-34.20
  linux-image-2.6.10-6-amd64-generic                2.6.10-34.20
  linux-image-2.6.10-6-amd64-k8                     2.6.10-34.20
  linux-image-2.6.10-6-amd64-k8-smp                 2.6.10-34.20
  linux-image-2.6.10-6-amd64-xeon                   2.6.10-34.20
  linux-image-2.6.10-6-k7                           2.6.10-34.20
  linux-image-2.6.10-6-k7-smp                       2.6.10-34.20
  linux-image-2.6.10-6-power3                       2.6.10-34.20
  linux-image-2.6.10-6-power3-smp                   2.6.10-34.20
  linux-image-2.6.10-6-power4                       2.6.10-34.20
  linux-image-2.6.10-6-power4-smp                   2.6.10-34.20
  linux-image-2.6.10-6-powerpc                      2.6.10-34.20
  linux-image-2.6.10-6-powerpc-smp                  2.6.10-34.20
  linux-patch-ubuntu-2.6.10                         2.6.10-34.20
  linux-source-2.6.10                               2.6.10-34.20
  linux-tree-2.6.10                                 2.6.10-34.20

Ubuntu 5.10:
  linux-image-2.6.12-10-386                         2.6.12-10.34
  linux-image-2.6.12-10-686                         2.6.12-10.34
  linux-image-2.6.12-10-686-smp                     2.6.12-10.34
  linux-image-2.6.12-10-amd64-generic               2.6.12-10.34
  linux-image-2.6.12-10-amd64-k8                    2.6.12-10.34
  linux-image-2.6.12-10-amd64-k8-smp                2.6.12-10.34
  linux-image-2.6.12-10-amd64-xeon                  2.6.12-10.34
  linux-image-2.6.12-10-k7                          2.6.12-10.34
  linux-image-2.6.12-10-k7-smp                      2.6.12-10.34
  linux-image-2.6.12-10-powerpc                     2.6.12-10.34
  linux-image-2.6.12-10-powerpc-smp                 2.6.12-10.34
  linux-image-2.6.12-10-powerpc64-smp               2.6.12-10.34
  linux-patch-ubuntu-2.6.12                         2.6.12-10.34
  linux-source-2.6.12                               2.6.12-10.34
  linux-tree-2.6.12                                 2.6.12-10.34

Ubuntu 6.06 LTS:
  linux-image-2.6.15-25-386                         2.6.15-25.43
  linux-image-2.6.15-25-686                         2.6.15-25.43
  linux-image-2.6.15-25-amd64-generic               2.6.15-25.43
  linux-image-2.6.15-25-amd64-k8                    2.6.15-25.43
  linux-image-2.6.15-25-amd64-server                2.6.15-25.43
  linux-image-2.6.15-25-amd64-xeon                  2.6.15-25.43
  linux-image-2.6.15-25-k7                          2.6.15-25.43
  linux-image-2.6.15-25-powerpc                     2.6.15-25.43
  linux-image-2.6.15-25-powerpc-smp 2.              6.15-25.43
  linux-image-2.6.15-25-powerpc64-smp               2.6.15-25.43
  linux-image-2.6.15-25-server                      2.6.15-25.43
  linux-image-2.6.15-25-server-bigiron              2.6.15-25.43
  linux-source-2.6.15                               2.6.15-25.43
  avm-fritz-firmware                                2.6.15.23
  avm-fritz-firmware-2.6.15-25                      2.6.15.11-2
  avm-fritz-kernel-source                           2.6.15.11-2
  fglrx-control                                     2.6.15.11-2
  fglrx-kernel-source                               2.6.15.11-2
  xorg-driver-fglrx                                 2.6.15.11-2
  xorg-driver-fglrx-dev                             2.6.15.11-2
  nvidia-glx                                        2.6.15.11-2
  nvidia-glx-dev                                    2.6.15.11-2
  nvidia-glx-legacy                                 2.6.15.11-2
  nvidia-glx-legacy-dev                             2.6.15.11-2
  linux-restricted-modules-2.6.15-25-386            2.6.15.11-2
  linux-restricted-modules-2.6.15-25-686            2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-generic  2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-k8       2.6.15.11-2
  linux-restricted-modules-2.6.15-25-amd64-xeon     2.6.15.11-2
  linux-restricted-modules-2.6.15-25-k7             2.6.15.11-2
  linux-restricted-modules-2.6.15-25-powerpc        2.6.15.11-2
  linux-restricted-modules-2.6.15-25-powerpc-smp    2.6.15.11-2
  linux-restricted-modules-386                      2.6.15.23
  linux-restricted-modules-686                      2.6.15.23
  linux-restricted-modules-amd64-generic            2.6.15.23
  linux-restricted-modules-amd64-k8                 2.6.15.23
  linux-restricted-modules-amd64-xeon               2.6.15.23
  linux-restricted-modules-common                   2.6.15.11-2
  linux-restricted-modules-k7                       2.6.15.23
  linux-restricted-modules-powerpc                  2.6.15.23
  linux-restricted-modules-powerpc-smp              2.6.15.23
  linux-386                                         2.6.15.23
  linux-686                                         2.6.15.23
  linux-686-smp                                     2.6.15.23
  linux-k7                                          2.6.15.23
  linux-k7-smp                                      2.6.15.23
  linux-power3                                      2.6.15.23
  linux-power3-smp                                  2.6.15.23
  linux-power4                                      2.6.15.23
  linux-power4-smp                                  2.6.15.23
  linux-powerpc                                     2.6.15.23
  linux-powerpc-smp                                 2.6.15.23
  linux-powerpc64-smp                               2.6.15.23
  linux-amd64-generic                               2.6.15.23
  linux-amd64-k8                                    2.6.15.23
  linux-amd64-k8-smp                                2.6.15.23
  linux-amd64-server                                2.6.15.23
  linux-amd64-xeon                                  2.6.15.23
  linux-server                                      2.6.15.23
  linux-server-bigiron                              2.6.15.23
  linux-image-386                                   2.6.15.23
  linux-image-686                                   2.6.15.23
  linux-image-amd64-generic                         2.6.15.23
  linux-image-amd64-k8                              2.6.15.23
  linux-image-amd64-server                          2.6.15.23
  linux-image-amd64-xeon                            2.6.15.23
  linux-image-k7                                    2.6.15.23
  linux-image-power3                                2.6.15.23
  linux-image-power3-smp                            2.6.15.23
  linux-image-power4                                2.6.15.23
  linux-image-power4-smp                            2.6.15.23
  linux-image-powerpc                               2.6.15.23
  linux-image-powerpc-smp                           2.6.15.23
  linux-image-powerpc64-smp                         2.6.15.23
  linux-image-server                                2.6.15.23
  linux-image-server-bigiron                        2.6.15.23

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel
update has been given a new version number, which requires you to
recompile and reinstall all third party kernel modules you might have
installed. If you use linux-restricted-modules, you have to update
that package as well to get modules which work with the new kernel
version. Unless you manually uninstalled the standard kernel
metapackages (linux-386, linux-powerpc, linux-amd64-generic), a
standard system upgrade will automatically perform this as well.

Details follow:

An integer overflow was discovered in the do_replace() function. A
local user process with the CAP_NET_ADMIN capability could exploit
this to execute arbitrary commands with full root privileges.
However, none of Ubuntu's supported packages use this capability with
any non-root user, so this only affects you if you use some third
party software like the OpenVZ virtualization system. (CVE-2006-0038)

On EMT64 CPUs, the kernel did not properly handle uncanonical return
addresses. A local user could exploit this to trigger a kernel crash.
(CVE-2006-0744)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

Jan Beulich discovered an information leak in the handling of
registers for the numeric coprocessor when running on AMD processors.
This allowed processes to see the coprocessor execution state of
other processes, which could reveal sensitive data in the case of
cryptographic computations. (CVE-2006-1056)

Marcel Holtmann discovered that the sys_add_key() did not check that
a new user key is added to a proper keyring. By attempting to add a
key to a normal user key (which is not a keyring), a local attacker
could exploit this to crash the kernel. (CVE-2006-1522)

Ingo Molnar discovered that the SCTP protocol connection tracking
module in netfilter got stuck in an infinite loop on certain empty
packet chunks. A remote attacker could exploit this to cause the
computer to hang. (CVE-2006-1527)

The SCSI I/O driver did not correctly handle the VM_IO flag for memory
mapped pages used for data transfer. A local user could exploit this
to cause a kernel crash. (CVE-2006-1528)

The choose_new_parent() contained obsolete debugging code. A local
user could exploit this to cause a kernel crash. (CVE-2006-1855)

Kostik Belousov discovered that the readv() and writev() functions did
not query LSM modules for access permission. This could be exploited
to circumvent access restrictions defined by LSM modules such as
SELinux or AppArmor. (CVE-2006-1856)

The SCTP driver did not properly verify certain parameters when
receiving a HB-ACK chunk. By sending a specially crafted packet to an
SCTP socket, a remote attacker could exploit this to trigger a buffer
overflow, which could lead to a crash or possibly even arbitrary code
execution. (CVE-2006-1857)

The sctp_walk_params() function in the SCTP driver incorrectly used
rounded values for bounds checking instead of the precise values. By
sending a specially crafted packet to an SCTP socket, a remote
attacker could exploit this to crash the kernel. (CVE-2006-1858)

Bjoern Steinbrink reported a memory leak in the __setlease() function.
A local attacker could exploit this to exhaust kernel memory and
render the computer unusable (Denial of Service). (CVE-2006-1859)

Daniel Hokka Zakrisson discovered that the lease_init() did not
properly handle locking. A local attacker could exploit this to cause
a kernel deadlock (Denial of Service). (CVE-2006-1860)

Mark Moseley discovered that the CIFS file system driver did not
filter out "..\\" path components. A local attacker could exploit this
to break out of a chroot environment on a mounted SMB share.
(CVE-2006-1863) The same vulnerability applies to the older smb file
system. (CVE-2006-1864)

Hugh Dickins discovered that the mprotect() function allowed an user
to change a read-only shared memory attachment to become writable,
which bypasses IPC (inter-process communication) permissions.
(CVE-2006-2071)

The SCTP (Stream Control Transmission Protocol) driver triggered a
kernel panic on unexpected packets while the session was in the CLOSED
state, instead of silently ignoring the packets. A remote attacker
could exploit this to crash the computer. (CVE-2006-2271)

The SCTP driver did not handle control chunks if they arrived in
fragmented packets. By sending specially crafted packets to an SCTP
socket, a remote attacker could exploit this to crash the target
machine. (CVE-2006-2272)

The SCTP driver did not correctly handle packets containing more than
one DATA fragment. By sending specially crafted packets to an SCTP
socket, a remote attacker could exploit this to crash the target
machine. (CVE-2006-2274)

The SCTP driver did not correcly buffer incoming packets. By sending a
large number of small messages to a receiver application that cannot
process the messages quickly enough, a remote attacker could exploit
this to cause a deadlock in the target machine (Denial of Service).
(CVE-2006-2275)

Patrick McHardy discovered that the snmp_trap_decode() function did
not correctly handle memory allocation in some error conditions. By
sending specially crafted packets to a machine which uses the SNMP
network address translation (NAT), a remote attacker could exploit
this to crash that machine. (CVE-2006-2444)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20.diff.gz
      Size/MD5:  6119119 7c8e68b20e2b5772e11e86ef1f107378
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20.dsc
      Size/MD5:     2511 ed2776255bbc37d4ec28219bc666450e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz
      Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.20_all.deb
      Size/MD5:  6780262 84c4f6e1c0f8be97a6663e662d00f94e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.20_all.deb
      Size/MD5: 37515070 13f5a6bd597bd7cc26e7e7570241752f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.20_all.deb
      Size/MD5:   506344 e43866ad706b123ccb1f7887a3bfc77d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    20830 65039758c34a2b9803898d0f1577e31a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    47404 11ca50ec66cef3ff27e69bf5ddf5c09d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    88900 07a8b316cc28e767d57d5f3490d71cf7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    30022 64dd2350ae98f77f22c23417be29ed1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    41250 8202527668e86a9402a924c7e92fdf21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    73604 d2dc1615ad0e2b353cf60c6042860f9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     5740 060e8b24a3caeb9734f99cf15e0f5152
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    34858 0f1ec19756bf0a7ba2e016d4320c9c87
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    55186 9e502b339d5177ce631da3c018287a69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   112960 c3c0c8327e1ccfad7658c720376879fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    40822 19212c1693af337d6c46708d4d6ac3e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   115724 5b364365f7159780cc0aa3bc10a34f81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   174642 f71484abfe8ad8983c12918d4ed28a57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    82588 37375ba4e1c4aeb59ffa3106fdc58af6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:  1467824 9d3b04576eae7b5b10c2778d39b6c61d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-generic_2.6.10-34.20_amd64.deb
      Size/MD5:   287694 f2f80ea9d6a88534431cb7ec24fa0409
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8-smp_2.6.10-34.20_amd64.deb
      Size/MD5:   284634 0a06c99af6feb7ebbe92bdf2c7d4d38c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-k8_2.6.10-34.20_amd64.deb
      Size/MD5:   286712 3f7c598c4fa35817b97ed04ec158c77f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-amd64-xeon_2.6.10-34.20_amd64.deb
      Size/MD5:   282278 14e98f8869fe645838d6dde8960a9b40
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_amd64.deb
      Size/MD5:  6140598 040fdc36ca15c657879fb233e96babdd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-generic_2.6.10-34.20_amd64.deb
      Size/MD5: 14580658 b71a8184f6ca78720675c5b5f4275d6c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8-smp_2.6.10-34.20_amd64.deb
      Size/MD5: 15123142 2d3d006dc78a32754008cff3e6612def
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-k8_2.6.10-34.20_amd64.deb
      Size/MD5: 15092724 4e734222617027d0826e084a7e3597cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-amd64-xeon_2.6.10-34.20_amd64.deb
      Size/MD5: 14964346 bccdcbefb5bb21210d151f74f0d4ea1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_amd64.deb
      Size/MD5:  1367274 5255ea709eba9438f864847990f649a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    14228 bc2ab7f3dbcb6bb6254a7d95961a7765
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   178508 c29516f2b3469af77163b72298d5e6f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   174888 f25921c93694a64110d5a7e11c07a54a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   731206 feca94b0d02954dba96aa826e7ebaf9b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   780904 ee21c0a8ad817f4ce2bc0c7bf908ddcf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   150048 3b4939210ceb4e7760e7884b9f61f563
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   168132 93557c5149b0c723cb6b1bae1d3223ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     9560 b398092e7a80607f99e844001b9ce2a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    94864 91055c75c5899688a3603311f3cd71e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    45730 4b389bad5ff04bc593232239ff596147
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    33166 c3d8d2b805db006bbc15251294d3dfa0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    55288 5a3852574c27da25e4724161b869db97
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     4662 68477a5fa1a36be1105e3c456dd17c75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:     7840 64d5bb446a53cbdf80acf4395943026b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    53806 b7e9b1db8d8a0ab3b587c476b8d9f43a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   111110 473a540114b990167e88b1b835ae7057
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    10152 476e66c50bcbcb4d88a8bf15d55ff46c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    60466 717dea9008ecb9b9a36d0226cf0be1f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   208566 6d9952396755a259def5a4386f0e904a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    69268 49723731dd5fc33f5448bbd4a884492e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   394794 d1c46e57ff011765315159a483c3a0c0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   294492 420dcb7e37eb1ddb31c47d3412f46b4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    12076 3e1008788d41da3c607ef400421a1433
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    22660 e87793acc7765a88790795b4062ee8e3
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    28806 9e57e710d0fd1904006a61a4f85e659a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    56802 c415dc22fc38a9adf2d2e8c521b828f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:    34942 ee496b5e756fcee4fa52d9af50e159f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-amd64-generic-di_2.6.10-34.20_amd64.udeb
      Size/MD5:   247472 8576417b43eb0294626b1b388304c38b

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    18168 ec0160e67b576a45d0a9b60f9df0539f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    44820 7087171327e9f1897f66c2402ee4f1aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   103058 acb437d3e579f3c41a0c2d701f21af96
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    86016 7ca15ee69ed2d3e4c62b31854ff4efd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    29086 f8c9d199ee551ca45422a5431932e437
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    39778 23600db6a281e3e1c1a3b065f9b14d54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    71152 2e45e650a63660f4c86ed54cbe29d858
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     5500 d58ec539fae5fa95e142147ef369fd2a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    31584 15cf4fd046eadeff2dad6464da7ec09b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    52934 6936463adcdda3629c1e758d90f0493b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   104464 4b865ee7bd1286623919a96dd9d331b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    38630 27e882c090989d77f3613765117cf77d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   114518 89928ea529948cc91aed23a4521d5b12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   190634 bab287374233f076f223e0b88b34cb6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    86542 b6070419effbc3e1b4bada780612a0de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:  1390250 90397cbe2b320b07a1e5fda28405b4d8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-386_2.6.10-34.20_i386.deb
      Size/MD5:   316356 536287da6a00cd58f2335077cbf4538a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686-smp_2.6.10-34.20_i386.deb
      Size/MD5:   312524 30b03b28a5de3945cfd07ff4742d1016
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-686_2.6.10-34.20_i386.deb
      Size/MD5:   314566 e0309dbc4bde6ac4f9f9fe69668b04c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7-smp_2.6.10-34.20_i386.deb
      Size/MD5:   312622 3ea4ddbee4b030178d541f6fb467d6b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-k7_2.6.10-34.20_i386.deb
      Size/MD5:   314494 237e095f6a0cec83a253bbf3944bc50a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_i386.deb
      Size/MD5:  6138030 600e2668b0fbfe98f6cf40947f2eb9a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-386_2.6.10-34.20_i386.deb
      Size/MD5: 15613392 0c393fb103e76a59807f845de341fef1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686-smp_2.6.10-34.20_i386.deb
      Size/MD5: 16192420 995c8a1c4dbc44ce3fb966e8faa59768
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-686_2.6.10-34.20_i386.deb
      Size/MD5: 16610356 305ad210ff1462bb06262d17018dbf31
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7-smp_2.6.10-34.20_i386.deb
      Size/MD5: 16304792 e43e2941f65e41e7cee26f64ae737840
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-k7_2.6.10-34.20_i386.deb
      Size/MD5: 16672754 64786d4f0570987aaf6b106d83ad8c0a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_i386.deb
      Size/MD5:  1366740 e3d2c30fa56a1d70855fe39dfd9af844
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    14078 3a8f33521e4a40bda0381d1d327e8968
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   183204 9a26ca972e9c058f0f3be0ce86bcc00d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   172774 20fe5bfbc166f19e8e9b59043141c751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   967872 16408fee6b8a70873333de59be722fbd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   780696 f30b922d0fac29994e579ba10b5eafb8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   140664 ad7cd49cb8c75b647d43cf8e99791ff0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   167946 598ddd006ee677dff42595b7d1ebceb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     9348 aff045a5ad6beb07a182a9ddb47d93b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    89314 9512161ad259441500ef387be3489caf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    48132 efbdc49d69ce5824edadd669d7cd74bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    30888 b3aac589af98b88c4696c1ce7bf13903
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    65900 652608558ced1aef35538bcfdf27b4ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     4508 c8fedf5c2e7e188e5744c1a62dea7751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     7754 a2813cdb0ae48a17a982a3eb7076fd57
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    50776 dbf5a86b0ef07adf110fc4ed6279d73a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   111590 eb734c5213dc7329835012bd7126fef1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:     9888 f316e1bba8978f441ea19c5780dc53d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    57156 a61515fe14e712e6ac7d982ec679dbf3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   242024 fe8a20aa87bc575dce65b91aed8f3c58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    66234 673964dcc1a485e62d7fcad8ceb6c04f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   436586 7ec1b2fc9ee8014a4ef8c329f32f8de5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   485668 859d40f7912cb33297ea6681006511ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    11470 ee405fc9ce8a4bce5ebb4899a43e1d9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    21242 a031ea0b4fee833a15bf6aa0912e6edf
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    29524 9df7a73cf3bf3b3cddc6c5906927f7c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   106268 86fb1955e75d519bf508c704d4ac50d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:    33826 cd0c18957807b607b09238638d599cef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-386-di_2.6.10-34.20_i386.udeb
      Size/MD5:   261336 762d2b5c78eb1fcce934f16890ea2cb4

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24056 757289889190318a2d93dd15a65e32eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24060 ba42a459cdf5bed60f0ad664d8139cca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    24046 993a4a25a8799a091fd67668950af050
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58284 1240aa61d4c5b12d7767cc02cdf875d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58284 0619c018768308c30117c01c731ad1c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    58270 315b06ba207fac7ac09249157e262ae2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30288 099d26860dff0de837745950b485c98b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30286 4dc160336fe27917b0626f35164af488
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30274 853d7980f7b2c59a1ad311fa805f4756
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109250 caa823915173bb1677cdabb549fa8d95
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109244 e84f7701fdf1d516a0589f9a82f640df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   109230 844fb56d5fa39e623ae8d5cd7dbe4e21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35388 ea0da0bba16cc5429dc73140469f7266
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35396 4ce2b8c990d878105d0b2dd6b1b9a6af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35388 8e82796824a725298c828a5d031fe205
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30934 f69937ec030ea1211eb7a24e9742adee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30930 7045ce60155a9da3daf229f4a07a9406
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    30912 53f2d8f4f6ede12ad6b11830b0f2f021
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212970 472a248518c1b7048ea96d1b23456ad6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212958 5a1b6e8c5b8dfe4a0185d02c0fc26554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   212934 10a25aaa511cdf7a75681bce0c632515
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6168 8884b25754c49f6dc547c596b9285b71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6168 edabe961784ea57073a121691048c6df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     6156 64611d41b8c9228a19c727625c116f12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43432 c945080cc74082d3869523caa5754f48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43420 24d2e6b4126804665a6628e7eb895faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    43422 4b8f545bf6e266a0dd497aff16ca0332
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4588 19a2f7191250805c1b4e11cd66e9ad9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4586 f8c968ad24ebe9b063558af9d420188b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     4592 48e517e5e8220932037b4f5b5c56b25c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66046 f892b8dbb091ea7a618c51cd9af05754
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66036 506c3d7f5569dbe0b67062891cf6625e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66036 37791de6094db317454f48dd800e2b11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   117114 18306380adcbe37bce01d1aa271037cb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   117100 39543336fafdac80b7b5c1f1ba146511
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   116858 a1969109547b95038c0d4c2d82083798
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66654 45afe2041ca77c4d13357d8584d65e55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66646 8d3681b2149e49d856d5b7a945334bd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    66636 7dd7f75bf19ce375422498cc62c4d9f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142052 8da92eb380b87a21de0fc6b1ef2c1358
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142050 2b04f6f09e7a89544d5168834d922c41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   142052 719aa290be93ce3068ac1ea67a437fa3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213976 101795a6563ecad2ee0fe4038cfc4766
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213980 686f231cff15cc539346186359e30940
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213948 e637923827f5f374d8ebf3a097c61a44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107008 a90440aa82a3f649a927ea8e85ea6208
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107000 ddf89961a32f81bdb80d2341685307ca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   107008 27a4243400b83d82226092c2e168e57d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1866842 4d45ac547824b9094e05fe3e63e7c02a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1871116 e539f7639ee9a123d235814cf885eefc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:  1901500 00c1cb0ccfb081f193d1307557496298
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251480 36117d5b58cfce171382a6e02314e58a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power3_2.6.10-34.20_powerpc.deb
      Size/MD5:   250940 448da862924240716c18ae0f84898850
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251336 8d47fef9434788b2be5f5a522359d65c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-power4_2.6.10-34.20_powerpc.deb
      Size/MD5:   250838 ef7700333b9a779e4161f7ea5eb1881a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc-smp_2.6.10-34.20_powerpc.deb
      Size/MD5:   251714 557db525c5f2748c83058abfb57ec035
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6-powerpc_2.6.10-34.20_powerpc.deb
      Size/MD5:   252428 f11ef2206ae15ffcc54992941c2c08a3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-6_2.6.10-34.20_powerpc.deb
      Size/MD5:  6158516 8c55a8b0f59564f43828ae74687ad85b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15648120 06119c6b558d8a22d3fb8d5a1ca758eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power3_2.6.10-34.20_powerpc.deb
      Size/MD5: 15211352 115bca7e2122c3af882f2623a9a3f245
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15636392 be98b2738250a6a93f38529b9b1b1c48
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-power4_2.6.10-34.20_powerpc.deb
      Size/MD5: 15204784 3512bfa1d1938cd2c6af1eba41588674
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc-smp_2.6.10-34.20_powerpc.deb
      Size/MD5: 15552404 5dc5e6e10ecfb1749053c1fa763d201b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-6-powerpc_2.6.10-34.20_powerpc.deb
      Size/MD5: 15246444 41a5100af8dfc661083128ecc3f93a3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.20_powerpc.deb
      Size/MD5:  1366828 796bc9d0fa760e1aa182131079e9d040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17356 c91ee0cd2c8c65d84aa4339ac1e7039c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17352 2e348724033e0487eef21660787c48f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    17350 952e68462a1816581efa18529aec8af5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213718 fd3c3d3e8a32befce12ea3babdf578f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213730 a40b8e505092aac312d05c096cf4a439
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   213462 5f0044a3f78ed5198fb65849c0a2c8be
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210738 dcb0e2a603885b67eb7ba99c3975b7ef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210746 8928793777ee8939b8e6d5535e3c5571
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   210726 af72bd5a204186e19e3fcacdcf2aab1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   688490 3c6327fdbef4e4ded666c191bc261361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   688462 f943a6860e502f83cab9d6e560d4f340
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   687010 99e2b6a6e67ce1b003e7f25e724f86d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780736 d14e0a57291c99b02dba4b1d351a1acb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780768 f65a2750a293d260f761d1d12c451751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   780766 aec7bd5abf7df435d3a8025f1e725a20
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511284 7bc14cb016405a0b47f22f01a21ef268
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511282 f05923104b2b739cd49ee245b54811eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510908 8c05ecf22fc6a67a61f154039ded2e0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   257748 4722b3a746e61881b706539938075e8f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   257760 585446794b8c757d993551c0073f5e3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   256880 7163d9e02f6efbf75eb5d949c7b0df62
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84424 ff0f8ccb3e6b06b6eb26a44c6553952b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84434 c139668816ed9a3866892ec714464d6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    84410 e6da0e37ba3c9143855046c72ca0f113
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60990 a40533076789c93f7d802f710e86c86d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60990 fc537a0b3559eeeb9e294e8dc11b3e1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    60996 a3430bc4c0a1d278e9b59f247e550705
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    65014 53323a0fcbd6ef930d6d04c10ee9957c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    64994 8c8c547e820d30f5faca3daa70526992
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    65000 30da7de0797115c8e3a0c2dff0480a03
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5382 904ac2993045228a4da410aacf6b4d7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5376 c7cfd47200fab04e3faa4c695162bdc8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:     5374 fedf96b5a2d08704b4e4878a07a3b8aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63274 9284e5151feb56b75e116c8c55fc3c68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63272 cb148f32a7f899aae29c2c5190a7e006
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63214 4f30572a28d1bb8e9a5bd10e005203e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131660 ce65874f5cf1ddd9a084bb28260b16c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131654 62e5c69450c22be6c6837c1548699a35
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   131664 b45962b63cc1abd3337fd7365238aca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70978 8c036c5f7283fa8535a8baf6964c034b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70978 c028838cae3aba6a3ee55fe4c4e1a92e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    70970 983bb35437777b9838cb1f524b8f9ae8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357328 5b0f07aba03289d17cc06e8b8f546be5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357322 8267fec62f2d7d68056cdb1c8b7374d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   357340 f3520761c4745ae7e107830df15ae180
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80734 6882e08074865ce3cff13f95b9d23d33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80734 1d7036992784e85836f80a13590e2bc5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    80744 0935af439af117d9b220cd8f231237ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   511000 f8a3fdbb6f629507ca54c304c14148ec
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510998 a366d8a51abe41de8dcef7615efa82da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   510796 7ca8480e9b3556182bfa80dd6c181550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389156 499eff26442a314eae3fe1c872b5482a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389142 7beb872afe060ccf51d7f3695730cabb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   389012 6a22ab402ccbe5bd298cf4155d75d0bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63154 eea1979f3b80f2ab9abf078ac8e197f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63156 54f520b629bef13454556bb34ea08a33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    63034 8951dc31e725e384d96137aea32592fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23350 9ba107926181bac0aafaad8bc9bfc9ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23348 59a355a0021eff64feabb00676684b1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    23110 45047aa03d1215f589c2366284f7879f
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35380 28435b192a5a3556be33a5757be67325
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35382 2db9e69bdbf7f1cb7d5b10efcebc1246
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    35372 9d921ee807cf5a579dc094e582b44887
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135108 01c56f9c0e8dd309303f2f40bc1aa39c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135092 230de80d437472f0948a9491f470cffd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   135084 19e0cfda95d817fc623c4a508d4bb841
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42400 b37a28eb83f0acfe18442131564a08a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42394 d1a235c0e4de4fc37a6c2ae9e84ab2f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:    42402 5d060c9249ebd12487011e6166672664
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power3-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294756 bc39cce7e6ab2a363b7690f151dbbf11
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-power4-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294758 64fbd290ee99ec65976fa27be80d2181
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-6-powerpc-di_2.6.10-34.20_powerpc.udeb
      Size/MD5:   294760 eac6b1685d00367e36bc02e25feefede

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34.diff.gz
      Size/MD5:  7979048 d8fab299fe68cb01ce0d844b9fdbc6b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34.dsc
      Size/MD5:     2516 717c666291065123bf806e176d48f97f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12.orig.tar.gz
      Size/MD5: 47177098 9272115d4005d4e9773a1a6170fd20cd

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-doc-2.6.12_2.6.12-10.34_all.deb
      Size/MD5:  4553566 a1ef4071c2e8f956f372096ea33a3995
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-source-2.6.12_2.6.12-10.34_all.deb
      Size/MD5: 40455436 af9d928bdf0032bc223f42225433c58f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-tree-2.6.12_2.6.12-10.34_all.deb
      Size/MD5:   377152 5f84388b8a3a218d10384c83c3f528d5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    20808 d4e1b65a57dbeeac45b33f1521e12c99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    45622 8cb0121682bf09f1cac846ad64a43f5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     2320 c92669893cd0d5646a18fc4c18f68bd4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    88708 3ae3d259bd31755ed3510d5fec4ccb24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    35156 44702bad1e1adbc8770628279cbac3a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    42378 9de89c3a4ac37c66760745f43c1a000d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    70530 3c6799cc5a6ffe13980895fe22e3dee3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     5746 24ac1bdf68c192d9412ee5452ea03e5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    34338 7f7b482747e204f0a0f4db78e6a051e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    53484 25e8bad4e6d7cd6938ba1f90961e3464
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   129596 a90636d93492799fc7597e5759242b73
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    43852 569c0348d5e80c94fd10b985ad807ad5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   115024 a7d6544e054dcb37145707a0a2902642
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   253688 7bb33fbec57560a4f2f7c3ccaf56ffd5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    83366 6237abcaa25f389cd4c7546b43c055f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1497886 f52481f0a97e674e1e8dab3a107dfb2b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-generic_2.6.12-10.34_amd64.deb
      Size/MD5:   804646 1f19fd29274b18a73a4fc02c3c073657
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8-smp_2.6.12-10.34_amd64.deb
      Size/MD5:   802778 8faf2d64387e02bab3493334522f21e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-k8_2.6.12-10.34_amd64.deb
      Size/MD5:   803708 efd8f8c79f3f92f15cdf1cc366566e02
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-amd64-xeon_2.6.12-10.34_amd64.deb
      Size/MD5:   800000 b8c368ca60877e92a2cabfdd30d89868
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_amd64.deb
      Size/MD5:  5919914 b413f0e78573a9c873a480fc189a423a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-generic_2.6.12-10.34_amd64.deb
      Size/MD5: 17088402 37f41a50fb5916add1d458b2e6f9dc6e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8-smp_2.6.12-10.34_amd64.deb
      Size/MD5: 18131064 30de98a63a697abcb8bf14e7ec205e60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-k8_2.6.12-10.34_amd64.deb
      Size/MD5: 17954132 c42a140a3c2a7646f65ef7117b05b30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-amd64-xeon_2.6.12-10.34_amd64.deb
      Size/MD5: 17898622 9f497da74da9f09eda195cc50a071b9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_amd64.deb
      Size/MD5:  3511958 490f151109d769124e4be9d231cbd3b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    14300 8ed855968175cd57d89782a2257eae44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   191796 d6bea66878fd5188fcfe3034af011b94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   170372 e6a54dc47f933d81d33c36100f06710c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1048458 f4f4157facb4a8c3ad0bf7b79ddd09e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1147282 cb81368443a48370533bf2fc8d411bea
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   122452 925cd634d430593dd61b3ead0fce05f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     8546 dc36272ab8439fa0c33dd3cf2fd4495c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    99026 5726cc1c3805a1e7dcd460f0df0347e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    44950 df5b62d66bbe6e87bf175bdb96de07e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    31658 7beb1e1d79e55022978020dd63c2571b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    65706 24c8b8c3a2b542e478b562b4965a8568
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     4478 35e0c3c2a2a8f2c3ead45252790906ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     7882 a423baf7b6a50f53eae11f7af4fe7b65
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    53872 be98c2351e732d52e81ed700ae0f4f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   107332 6e35f131fc93466a08c4e30051ca798f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:     9884 e68b6e660a617b2b018e0f5882f9a132
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    69768 cee1cb4c98600a0999cda318e3223410
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    73064 35945a4de11a4927448880d441936319
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:  1271098 3871bd54d9892c66fa072b11b23f20f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    58398 03084628ddc86cdf90499e490e1482f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    22216 0bd9e6e3003a4c6ec4ed8e2958af3305
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    29364 8bb827c06f72358c9e198ab9d2e21ab1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    62202 4e33828f4d30b055bd7328ef26e7119d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:    34966 0876549f10809902c91fdd898342ffca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-amd64-generic-di_2.6.12-10.34_amd64.udeb
      Size/MD5:   248890 7e8ac8e3b285da4bf4f570078661ecbb

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/acpi-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    18670 46253f05423baae217a77160929abd1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    43956 04e007efc1890407d07ac6db7d6efe41
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    96878 230db298e7a1af1773d06f5fcf7745c1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     2280 e90a29eb6bae1b4eb30271de051187af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    83574 7da2f3e4a347d27d0cd5c316a43ef196
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    33136 722089975c4f881930a70533cc1ce490
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    41918 84f609e4f4a029aab7f8728fd7babedb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    68232 cfe7f9a0406ec1c6244749c5f4f582c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     5366 8891bff0625e8fcb31b03f309ef678b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    31132 34374bc39969804a5c59209c58f56ad2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    51410 4373ea79416b9221cf1bcd44e71734e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   123396 99ab00e2239c416f8fc9fff3235c73da
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    42476 67e415fab7cf9a045a9e7e1b008da27b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   110270 8aeefdd52c20dcbbce5ee5e14ca42473
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   239822 55a7a43e374397c6f393e9f062f8192f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    86178 0f83056aad3dc95fcb3e33020999ef46
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1418110 018188f299f0952cc08b877f938ddf63
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-386_2.6.12-10.34_i386.deb
      Size/MD5:   802606 fcb043d7a33501068e4db792098aea22
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686-smp_2.6.12-10.34_i386.deb
      Size/MD5:   798106 3bc7ed5bf0e1892370a13432b6665f79
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-686_2.6.12-10.34_i386.deb
      Size/MD5:   799908 5015cdbb03ee892e169b86d2cbdaf5bc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7-smp_2.6.12-10.34_i386.deb
      Size/MD5:   798160 108f5c8dbdbded4f40e2c9149f265960
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-k7_2.6.12-10.34_i386.deb
      Size/MD5:   800472 13139f5630a0f4bc3647c2e7ecf0394e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_i386.deb
      Size/MD5:  5929346 15140ae5024da8dc9a2dc68bdbdc7853
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-386_2.6.12-10.34_i386.deb
      Size/MD5: 18026476 d47beaccd8a495c3f07423250c79047e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686-smp_2.6.12-10.34_i386.deb
      Size/MD5: 19368024 801e45ab6d3046734ec6e8fd0ad36190
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-686_2.6.12-10.34_i386.deb
      Size/MD5: 19464046 64ec6ba5515fd363a4a27d13a1799186
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7-smp_2.6.12-10.34_i386.deb
      Size/MD5: 19500468 cc6b7b5f0fdc81f7c87616f9d077e320
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-k7_2.6.12-10.34_i386.deb
      Size/MD5: 19545538 413f75daca580466b82a9b49e22c26a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_i386.deb
      Size/MD5:  3510544 92a8ac5f1b52e752a23882a779ebf610
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    14530 b9c76cba4a838d75ae05e3db8f189031
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   194796 5b73a43d75060dd3f79d7f8316b2f693
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   166500 486495a8bc366a19e76c47ee9046f7b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1048168 1a25213a44f78a8b3edbcb052bd294d9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1341408 1d298a9384d1e31f47d7382d3d0cdea3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   123680 f2098f477c0b4e9cf05b1b2f881e3c6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     8246 fbafff5c5134ac026b69b5636e5d5e0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    93378 94cff703adbf87a0f3b61c227b67b43c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ntfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    46820 14c98bda4ed3afc6fa22604a31aa8121
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/parport-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    29774 ac0cc81646211e9717872143c062431c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    72282 49f7b2672f23a07a9dc566492300154a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     4258 306b5328546cc534669e40fc26140d4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/plip-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     7666 fa9b8a7958e9409c86985ba3bd851b9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    50622 24b55801b2f2de3bfb139edcf8058d51
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   108634 d3f9edaafdd574f7bcb892e818ca4735
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/rtc-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:     9806 6ce1cd2142ed99ed592ea4fc0d96c3cc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    67636 2fe3b7f78eb11cb765b31fa8415ad867
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    70182 e47a757a3f27a84d3a068acdce1637e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:  1481126 b53e9c227b521fe4473c5ff01ab6cece
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    55208 1789fe70b41328c793b1771a40cb8913
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    20352 20309045486b79420bea54c61efb8616
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    29912 98f21701e784726f0261128365dd38e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   111228 b92fe1ecf12ddf979ed48dee47d3bd7e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:    34562 b4fc511cbcfbf1c33d4030b0da021c4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-386-di_2.6.12-10.34_i386.udeb
      Size/MD5:   263266 74ec9f373022052012de2a16a6a549bf

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    23362 64ec1f12d26bfd20f070fea026e0e4c3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/affs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    26352 82a929fa11bd35bd54101aa5fed1c55f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    55914 426e2788e1a026c2b1a80b5b2ec13c3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/cdrom-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    58844 6e8417a965b3fef7d72f365ddc5b5d9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     2312 625fdf72197c5f7fa3cef4f8e759bc72
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/crc-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     2514 170397e811d8092082adae16b51d6eef
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    29752 ffd91970cfe4cdbc3a0ee33c0968c40e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext2-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    34718 42aa122487e67569bb35924368c09458
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   104678 8292475a8160b5f935982b3ca39aba5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ext3-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   122196 60ac500415ead2787779983c8b9e2f9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40500 18998450a3739e6a9846af9d7588eca8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fat-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    45914 eb4e0ed013d8d87a864b732273f9f383
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    28996 94ce95ccff6fcee760062fa36ba5478d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    29934 5abf5e07f1754b75dc4c355dba3020ab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   210090 ea30784ce9f1fd689d4553d474af2f3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firewire-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   224774 567f2483f973f53f4abadb5634d7e98d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     6148 2630cac6fa70f627aa9333e93f06275d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/firmware-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     6966 591b5f3cbc4048dcd7df126bf90ed17b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    45168 3f3da16683cd03d8bbd25f1ddcfbf642
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/floppy-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40418 3b77a7053457f4b54b1894719cd8e226
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9792 575d60fb9e575d26c693757f9ebc6283
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/fs-common-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    11786 6c0a30ab0cf31a06403c59ed0126410a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76784 7d6ec8c375ef661b9c6e22d1b119e5e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/hfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    85196 ea34886aa97c5f9bbe099140a06b12a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   112152 3347adcce6acedec90fa7ab802b931f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ide-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   129228 f47571ad7f6d55fe5e4a7f0eff991120
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76744 28c2763e89db8cbcb5969d86f1763d60
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/input-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    90418 5c1045f51afa993577f9c7934252429a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   140756 dfee46de58f2d21274480e508592c024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ipv6-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   157284 a6b80f44cf6e664f8f9f422a9f874c9f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   306088 df9ea1a468cc71b6377ebe4086399e58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/irda-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   210720 86525b53657fc9415129e429c4fdc337
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   110782 ebcc06f4a57efac4fc5d4a67a6a889b3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/jfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   116650 8c5359805d7ead36db59d575a7f5b8d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1976510 bde3db48436b88952f3d11b0c4faaa45
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/kernel-image-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  2350458 447efc5e01c183ca0fa80cbea880109a
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-headers-2.6.12-10-iseries-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   773920 10213d665ed315bbc6092333d40fcf1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   782804 624a039969962e0a21a830a8cece6899
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc64-smp_2.6.12-10.34_powerpc.deb
      Size/MD5:   800732 785f06fca97532b91d7357a23a432309
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10-powerpc_2.6.12-10.34_powerpc.deb
      Size/MD5:   783272 4605c8ebdac7e78b61c29643068755b6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-headers-2.6.12-10_2.6.12-10.34_powerpc.deb
      Size/MD5:  5937076 18e2574387ddb85392ac3a12235a6f54
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/linux-image-2.6.12-10-iseries-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 19521394 20464585c5cfa6a8fc1670a6e89f10a0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 18358580 4262cde31e55150664bb501635557169
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc64-smp_2.6.12-10.34_powerpc.deb
      Size/MD5: 21186426 b2c5090bae7ff88da6fde238d9f246de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-image-2.6.12-10-powerpc_2.6.12-10.34_powerpc.deb
      Size/MD5: 18006446 adb49c6a5bd73a4cd152087feb36eef2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/linux-patch-ubuntu-2.6.12_2.6.12-10.34_powerpc.deb
      Size/MD5:  3511906 d15ad4372d829ac80afae83ff805e5a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    17620 1733c726a1a5959654b968236d9a12a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/loop-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    17786 94d7b2c8d885e1351f97105081670afb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   234110 be049e3b463e57b26ac9a221e0051073
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/md-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   258856 3e261360233d9105059a2339792e057c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   208854 4184a5925174591fd12cb658164ca8e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   235402 7409019e891d013e701aa0a581e27c2c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1048262 3c1595317b3062fa31adc54be528740f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-firmware-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1048452 81dfda3c9cf1ac1aa4e4cc3ac3d81360
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1457996 bece9fc2948192cfe95ab42597fa7d4d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1623022 9c050db9a4caa649739e7f59208c5cd3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   212810 1524118652212f65d20f8d65c6afc16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   197970 1fd46fa3d4f1b6a0d74109b3adcd21d2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9462 fc5ca3c3a93a8b74b7ed16d16b9fe92e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-shared-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     9060 2dc94cde22220e0c2e07d0187685af3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   115324 5cf873d1484b00c0d2ebe69f6b0e7db1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/nic-usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   134454 076ffe576e767b20494a2d78242a4714
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    77020 e51db9b034ce39b8af53d7cafca8335d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    87530 9e5befe810a56cc3f2e415c445b5f1c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     4812 cb1f792315833bc74cd5aba4efed179c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/pcmcia-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:     5286 b2c1e5d48dc27772553d4a1c9d74dc47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    63050 3cf0fe7152cd05505c3c232dd64b1864
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/ppp-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    76008 c5c25f33a7d43a905ad4ca329a2cd5af
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   128626 9b35a60f1ec3a7ce212effcfd3280ff0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/reiserfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   164360 57dc98ca56df1946eb90bf221a4b3f9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    77430 34b0aad78bf32c74dba7ec5c277d0c53
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/sata-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    98154 6d443efa2e82993e93fb368030264ce5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    85238 3ade6cb5c6ce17dae4b19eb5e320d1e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-core-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    92326 f01b4d714601784f8a61448ddc9119de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1537866 8ebd1ed508ab39b4342f443e9e6dec1c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/scsi-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:  1755650 48d11d813ec0190d14d451668556a8a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    65294 c67db2fc2166eb858615b2fcbe19afee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/serial-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   100434 388f35e6576f9efa9ea2d4beba03b7ae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    22886 47547ea2ec62282f3c474e6985ead2a7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/socket-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    28604 31705f1d1757570ad82004f1d86af521
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    35496 6a076f2a615b0a081a3a414a180b6fac
    http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.12/ufs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    39802 ad4a6fe837c1c13f1cc1c08ad2291ac3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   139882 d9146f734ea9b6e3c123b357f1b77140
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   152636 e9c8ca6da057acc2be24e97902226dfc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    40960 14cc612a1d4ec2229c0fd5b99ba50946
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/usb-storage-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:    44426 cfbb4ccdff54becd8a94f45979c88d4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   296160 da32b18c5aeb077081180ebf8a330d5b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.12/xfs-modules-2.6.12-10-powerpc64-smp-di_2.6.12-10.34_powerpc.udeb
      Size/MD5:   324194 c3994807d7fa8f88bc24db36c5519aed

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43.diff.gz
      Size/MD5:  2079780 b9f583cc6afdf2977c8b8eae28b5f440
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43.dsc
      Size/MD5:     3019 66ee7ff62ef8b71dd20d647fa873725b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.23.dsc
      Size/MD5:     2895 50a5cb7ec78f77fa764829c7a3753b67
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-meta_2.6.15.23.tar.gz
      Size/MD5:    25216 9952710cccca0aba2a75fca926596389
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-2.diff.gz
      Size/MD5:    87047 2a3528df6d0169f3d8cfca46bd1ef2bb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11-2.dsc
      Size/MD5:     3190 0306c9ec6aa2cdae0cb334ac91566711
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15_2.6.15.11.orig.tar.gz
      Size/MD5: 97566445 8bb235f9119aed52797b057827756b8c

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-25.43_all.deb
      Size/MD5:  5154730 5cd462491c50cd8ee2c7dbc911b22fcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-25.43_all.deb
      Size/MD5:    85762 418b47578cd3a7729aef8e45b93a6f7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-25.43_all.deb
      Size/MD5: 44459586 a265911f19b0f2ee0613e73e7cc765f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-doc_2.6.15.23_all.deb
      Size/MD5:    23308 255420b11a34aa739ef00e860bd43cab
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-common_2.6.15.11-2_all.deb
      Size/MD5:    17742 3f9c1648c83b0fc47978eb38a63b437e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-source_2.6.15.23_all.deb
      Size/MD5:    23338 fd9604c438a2e39022c5f0af7e93b508

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    22134 ff67a9629440c827c398e0e79fe12ecb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    44754 2019c1dcecf960ac20b3ed8df3592bcd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     2306 d55926f34c8dbb464933e3c1afb71ce7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    36182 fab255d4f6c1afa79de9c1d9c67bdbe1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   102028 428ac80eeb1d1dae1a8a94b3ea843e81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    38616 32a5aa329626d31d79b0fbbb822d8a3b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    49124 9e0d33a6b7c9c563212fb2951eddea01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   176744 62cadc976b86e84249a7047e6fcb0176
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    36760 997b87b399c420cc2f0f69424716763c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   142154 9d002e9f1a6267296400452211c3a1dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    51006 e199e786ad81e0413ace74311e27089c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   140422 589745ed6249cc83af7262d24a199075
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   286882 272a18bb84e98868173c1a3fedf6639e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    97792 928ecaed0b6a0c3d45815015787470f3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1643610 25e6fc6e89fa37d3866010a3b9e5dbe0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-generic_2.6.15-25.43_amd64.deb
      Size/MD5:   857810 5d53ad23b33464b240b8f7f6ac76590c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-k8_2.6.15-25.43_amd64.deb
      Size/MD5:   863364 98c8bc48305c0d97d5341b262256b0e1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-server_2.6.15-25.43_amd64.deb
      Size/MD5:   862374 0bb2ef56b038415b9d7482c8dbcd8c0d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-amd64-xeon_2.6.15-25.43_amd64.deb
      Size/MD5:   862206 77285b205416fdccbb0b99c372688a33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_amd64.deb
      Size/MD5:  6906656 55350a0c2a37a2d55c0c68fb18efcf3c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-generic_2.6.15-25.43_amd64.deb
      Size/MD5: 20711310 674643934508f7ef93aaa85b7b13be1b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-k8_2.6.15-25.43_amd64.deb
      Size/MD5: 20686212 ee34b40249f31deecc57256c959bdc6a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-server_2.6.15-25.43_amd64.deb
      Size/MD5: 21531804 a1f885449635fc0d13b4211eabc97130
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-amd64-xeon_2.6.15-25.43_amd64.deb
      Size/MD5: 19806164 cede5e9bb4229aecd770e63391f2c676
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    15622 6c3298db44af9be7c2d1b88630b16f2c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   240272 be9bb3fd65a9a4e9f0d036c64c3ab5e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   202564 677f7025f079a9681d13975992594dcb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1048592 ae4e13a42308218cd9c37ad54a0c9b24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1432248 13650fd19387cc9b339ba3c1f3831c13
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   161568 b01436219f7ef600146571056022650a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     9826 547b5f3f764f0a01f16f7be313d2be66
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    80862 8952b15f4f74661cc19b1db892ffad14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    49168 92cf2c75382f40b416ee1980968db272
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    35146 9ea1f20e0debd152b80d5b17b1a42d74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    70874 cd190044b6440a1ffa143b8af3e21614
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     6218 35c6d580bbc812ed279c1757659621fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:     9052 b25e260615531677f896dc1ec9a71f01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    57880 8a18e4dd75097bcc895ecd40cbd63030
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   123320 c3934fa49d6596a1cd6993eb122215bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    92180 3cc4403a41280e3f52e319757c87aa7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    79208 b8c6d0361eacdd8119c48cfcd18dbc88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:  1595700 1d565ff7a193e4ec3f8beaafd5a21e19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    72276 995d2c3d79923d1c51efd50ed3dc9bfd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    12644 b09ce59c7cdcd98daf9f50cc3bb87530
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    33732 98d90b38c588de131651837012eebad4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   138184 b1525f07454e4194cf363148a7258da7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:    38862 f2e4bf9c1a7a8859ac96d962dd9f0dd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-amd64-generic-di_2.6.15-25.43_amd64.udeb
      Size/MD5:   278740 b58470959c82549f4beb9de5703c154a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-25_3.11+2.6.15.11-2_amd64.deb
      Size/MD5:   474866 949a50b0afdb59c4435d8002847e303e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.23_amd64.deb
      Size/MD5:    23370 e49f383977fdd6657519d810b607d899
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-2_amd64.deb
      Size/MD5:  2404872 8d1116108b85c85a6a15384a3d3286c1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:    76052 85c23cc1cea393a31a4ea7e903b9b33f
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:   510186 e4d5a3e09213b00e4af48ab3a72d797d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23374 8783b4eb94d35863b6b23521ea8800bd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8-smp_2.6.15.23_amd64.deb
      Size/MD5:    23446 bc2a14958ed454a956dbc24693694e3f
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23376 1d0c6f32cc7c27867e9c79681612794a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23360 d6f1b5d1861bbf87888c938487909613
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23374 727c695add46d900405a8f567b96bc5a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23360 d76862c34b4a4b99512328b6ddbc23fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23368 83daedb2b7f64937a72f92e20edbed59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23362 7a92d965e6cd2aef070fa91de991bb47
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23362 d9081edb52550a76a17eb658f9920eb9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23356 ed64d1150e18a54b15a56e2cdf228b61
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23358 a4b030b97384c5d543a03e4261416d77
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-server_2.6.15.23_amd64.deb
      Size/MD5:    23356 73fcce335996d8d1f3c29bbe806dc319
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23356 0aa9f2e1f5cc7ba2007aa9834b823369
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-generic_2.6.15.11-2_amd64.deb
      Size/MD5:  6861066 5334e0046eff3f8041e8e0511c43b805
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-k8_2.6.15.11-2_amd64.deb
      Size/MD5:  6860570 9eed4452dfad7e8cc18341eda36a6a6a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-amd64-xeon_2.6.15.11-2_amd64.deb
      Size/MD5:  6837408 cc2866d6b856259d053aadfd640f1192
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-generic_2.6.15.23_amd64.deb
      Size/MD5:    23386 587c9676bf28a8e1566909ea41280ee9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-k8_2.6.15.23_amd64.deb
      Size/MD5:    23390 98ea001744e627d489a2c2bf1ae19dc9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-amd64-xeon_2.6.15.23_amd64.deb
      Size/MD5:    23386 b70b8ace9c1f40c8a982cedfdfb770fd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.23_amd64.deb
      Size/MD5:    23322 b701ac0c170731f8d0f1d4228ace7361
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-amd64-generic-di_2.6.15.11-2_amd64.udeb
      Size/MD5:   799520 3768c1fad61bceeac1a91b1e57edf577
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-amd64-generic-di_2.6.15.11-2_amd64.udeb
      Size/MD5:   497768 097a2c35531e637f747afc8899861efc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:   166006 0dee1273cd970ca7739f0d9270b72b39
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:   161600 30f6fe642174f141ecd5607259b0e3a8
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:  6070426 10cab4b65ca1bf77318b99eef5432887
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:  7320164 eab467f972d6d33a0dd2e75143a504eb
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-2_amd64.deb
      Size/MD5:  1758336 8eeaca383a0c35624fc31c518dbd2164
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-2_amd64.deb
      Size/MD5:  1405544 dabb643a583e5f5b37dfbc3d025edbba
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5:   125124 5a92263171f05d6e169472be5c2cf1f3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-2_amd64.deb
      Size/MD5: 17296342 8664077d25232ab74881ef9da4870ac4

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    18966 4db259dfa66d1af8e604c9bc1512f040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    43454 9effcdb9937fd4af0a82efa3f43cce6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   105200 8ffbf937fa2c397357e645d345339e4e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     2280 c4a7e19dbd64dd628279a74ace5845e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    34476 62a17c898d87177c4821b17431ef265b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    96794 e425aa8735407916fc42468f1d1ac4e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    37066 d34c160aa30e4d0a0a4973b33b45cde3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    44074 4ac2d0e974efd03522bb70d214907e74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   167672 fe83fda8fee0bdb5ae28dfeb272bb155
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    33926 0c20183403740be26aaea3995804b0dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   137794 3bcd8287178447c6e27fe2e889677310
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    46846 4a9b7866654878153875839b265afdcc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   132754 6832ef7eaa4940258a1886120583aebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   273640 ef5113efdcf6214c9d8f7c8796d35253
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   102252 eddd6d201b83bfb58244b452b51d4416
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1594594 1fcc8bc908bc9d51ed34d604f28c0baf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-386_2.6.15-25.43_i386.deb
      Size/MD5:   852348 098f1592bb44875107ebadb7085e8faa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-686_2.6.15-25.43_i386.deb
      Size/MD5:   855314 837773d2dbdbfd93826d19875a6b7ef8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-k7_2.6.15-25.43_i386.deb
      Size/MD5:   853532 bedb504f1918aaddc6638fd6c2ece0bd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-server-bigiron_2.6.15-25.43_i386.deb
      Size/MD5:   857216 801415bfea06f758b09aa6a62b4d144d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-server_2.6.15-25.43_i386.deb
      Size/MD5:   855348 82df02173953f35a1d2cd93923c06693
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_i386.deb
      Size/MD5:  6898992 6f551f5f98d585d1159f77a46c021ead
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-386_2.6.15-25.43_i386.deb
      Size/MD5: 21617016 6eab13de38c2a833941274fbc52e1cfb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-686_2.6.15-25.43_i386.deb
      Size/MD5: 22400042 f223520f53102dd8d8f946d9d0c5a7e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-k7_2.6.15-25.43_i386.deb
      Size/MD5: 22145868 e881960a141dcea275beaeab23c58a56
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-server-bigiron_2.6.15-25.43_i386.deb
      Size/MD5: 23510198 6661359218f8410eb7ae9bcf7f0ac713
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-server_2.6.15-25.43_i386.deb
      Size/MD5: 23061696 d5721fdabf7d83a64c9448e1b52f3a64
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    15496 56f9f923e4576db341f4af69675eb164
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   238434 96661b9d0051bb19647af21210162ee2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   196962 af18e6ff73c5edafb60a25aec076c4ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1048386 50952c3c8a187ffdf7c3ff203c3f5541
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1631532 7c1efa5d87752482381c0720072a07e6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   160754 f17a1fc9525d89993b8b6de8f94c4b74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     9158 199e9b6c1e1c6fc7115129b200ed63e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    76482 7e7b46454225379d4722dec8eaaf8a76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    53248 ae0df304ab4c7d7dbafda1882c56765a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    33054 609720e4943ab874577eac0c94ffb62f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    85616 cbd3e65a77c3b70a3e0f0d5fa23cf34e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     6024 ac12c96fb84f6c807cc15c6d8f08089f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:     8754 32410bbac3a6663f1d108f7c13027e4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    53594 94b6411e5a9bee1e5edb8e574037b7b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   130776 5c39088787f8861437c46401aaa04885
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    90358 087190d72686fcda50f17aae9343eca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    77114 fda8eb92686515697c22ef29b1292396
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:  1769690 30f3dfe372b6a5a8ba29d4428f7a728f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    69556 da87db3cc9d9e70b50c2dbded564c300
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    11758 0a89a1c85ad41a6c1282de9767e0ba7f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    35998 db5df0db601e6c87e8a8d3e2707eae3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   132280 7a7f0954fb7006cb1b0a0ac0e25f0742
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:    38464 5bfbc46a68c0fd83e39071ab0d29d9cc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-386-di_2.6.15-25.43_i386.udeb
      Size/MD5:   299114 02f56acbf7c35cef132423589640553e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/avm-fritz-firmware-2.6.15-25_3.11+2.6.15.11-2_i386.deb
      Size/MD5:  1204376 ee383fc8c7bdccd9b7f1735c2c9585cb
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/avm-fritz-firmware_2.6.15.23_i386.deb
      Size/MD5:    23374 98b6f289aa92b3e554fae20ac764d85c
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/avm-fritz-kernel-source_3.11+2.6.15.11-2_i386.deb
      Size/MD5:  3692380 70b73c1754b364a087255396f57f7047
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/fglrx-control_8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:    72956 b3fda82fd1880c6e29a1517b021ecd4e
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/fglrx-kernel-source_8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:   660264 1e075527c2fcacef72985cb8f29447d3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-386_2.6.15.23_i386.deb
      Size/MD5:    23350 b655a17dee05f2aa9399d8f2fd435297
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686-smp_2.6.15.23_i386.deb
      Size/MD5:    23450 095e7e9e2a35d20dc67a6143ef82b1e0
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-686_2.6.15.23_i386.deb
      Size/MD5:    23382 5ec06667b2fe0e7d83514089afaaf605
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-386_2.6.15.23_i386.deb
      Size/MD5:    23336 4d9523269cbe8f1d51b80ffd6ebb52ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-686_2.6.15.23_i386.deb
      Size/MD5:    23368 9d033035e09fdd91aab6dbf0c8fb3e52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-k7_2.6.15.23_i386.deb
      Size/MD5:    23348 6d82b0b953616c538170f08025543f8f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23372 4566452a28e86a21540f6443e7800600
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-server_2.6.15.23_i386.deb
      Size/MD5:    23360 1533f68d19639e1314dd69286bb9f75f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-386_2.6.15.23_i386.deb
      Size/MD5:    23330 eaf3bb4eadaf10c3c38e8cf4d96e0322
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-686_2.6.15.23_i386.deb
      Size/MD5:    23364 d45bc99c1899276c84bb8186d88e0912
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-k7_2.6.15.23_i386.deb
      Size/MD5:    23344 fb4fc12a5a39baed75dfb822c415d02c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23370 837ffc0e9458051da0d9c6dd42b05092
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-server_2.6.15.23_i386.deb
      Size/MD5:    23354 4b70065bb5de55f807339e9aa90953fe
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7-smp_2.6.15.23_i386.deb
      Size/MD5:    23430 414373d5a5a1170a44ce2665f82dabb6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-k7_2.6.15.23_i386.deb
      Size/MD5:    23362 c55dbba4c7f3355df2dc9da175983a83
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-386_2.6.15.11-2_i386.deb
      Size/MD5:  8137568 b60396e41728f77729e34d884f0fb61d
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-686_2.6.15.11-2_i386.deb
      Size/MD5:  7939206 a9f9d34163a391f3fea63bc6d759554e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-k7_2.6.15.11-2_i386.deb
      Size/MD5:  7937984 737fd0a53873751c8ae6ce424cbba6fa
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-386_2.6.15.23_i386.deb
      Size/MD5:    23364 97b7d4b0ccedcfb481536e844e9944d3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-686_2.6.15.23_i386.deb
      Size/MD5:    23398 61c0aaa00119c783ab90bd8a3931dec3
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-k7_2.6.15.23_i386.deb
      Size/MD5:    23378 80a80ee871b8de8d5a3b0b1c5dd50fe1
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server-bigiron_2.6.15.23_i386.deb
      Size/MD5:    23370 01225ea4914bf6b037586bf3e0966c02
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-server_2.6.15.23_i386.deb
      Size/MD5:    23352 73c9fa16752ef9105ae764b5b0b0dac7
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux_2.6.15.23_i386.deb
      Size/MD5:    23322 c6b100db3aaa730cf73c4490bd5ca12c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-386-di_2.6.15.11-2_i386.udeb
      Size/MD5:   799338 5a980a3340d617887f12c930f3a44483
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-386-di_2.6.15.11-2_i386.udeb
      Size/MD5:   475488 83de1b5ed76ee9cb716ac1854d25e636
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-dev_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:   146740 25d0c45b1ecd61a8d64c8aff51f5a5d6
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy-dev_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:   139692 e138399a40736b887208999c33c6cbcd
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx-legacy_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:  3060002 8338965631496ecdcc36d0f5622a8f01
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nvidia-glx_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:  4058936 4c6f353d50ea4c3e3cf053e06290c5f6
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-kernel-source_1.0.8762+2.6.15.11-2_i386.deb
      Size/MD5:  1693126 63d722c7baa07046838dc010d29bed3b
    http://security.ubuntu.com/ubuntu/pool/multiverse/l/linux-restricted-modules-2.6.15/nvidia-legacy-kernel-source_1.0.7174+2.6.15.11-2_i386.deb
      Size/MD5:  1401342 33b172c4c67772d6ac6aabf9b340a61b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx-dev_7.0.0-8.25.18+2.6.15.11-2_i386.deb
      Size/MD5:   110602 39c05f985f7d3faa169e0174bf902d7e
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/xorg-driver-fglrx_7.0.0-8.25.18+2.6.15.11-2_i386.deb
      Size/MD5: 10556804 4263979c1848292869c4d6510fb98939

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    23730 7faee7c638f34242a10a3e2c9e8e827c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    25940 7ae430079f8de538734a1917f0fa4ebe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    49290 692e08c8578e3af785c97270c051ce85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    51518 1b888b41b618d4548c31c7b2f055d6e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2300 5cd4ce64af230c533070d82f38b1a7ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2476 a68a02505219f0ded4c523d5360ba251
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40116 7009389eea11a821202b23839918565e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    43680 400bb6f10e787141303d76693f2b84f0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   112348 f933eeb0cf2dcf72372cfc4d804c008e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   120436 72831068a1fe03c280d1162a48dd07b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40848 63282d28ffe5ff27424896541002735c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    45340 182fa9becd9aaca3be5a5c514fb5181a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    29024 b009956289b247a1228b60c989c88a2f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    29896 e094885841aab990e1b130a9e720c598
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   211388 54750fde9a763f2a01f62d55b5bb574e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   225200 dd0c7bf901a410e42e732f78edf89388
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    45042 593cd5a0545cfa96da3a20b71f0acee3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    40212 26404f5a683f0fa91b8b4e9db1b246f1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     1928 253d3f8daccae2b3b2e154f680539694
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     2198 5122db987b8302605f5475e235440825
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    80590 f2e9b3dcb39f166ef5782a31370b7d1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    85942 bcb8a9300422dd2bfffacf3139faa909
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   111616 7258a4971a55232396a6bc1e91241a36
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   125742 2a28587128c7d651af4b9dde9362bd3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    53354 0d8d0bd87be4aac9773fc592f70111d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    58460 9a2e42b21b9aba0a50ab6abd708be275
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   147648 6bdfc456aa0f68b90c525bf6b15c1ab3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   161432 7cfcd9691b10c9c077b11418aad781ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   317558 d2a26e66cd6842fa1d63300b13c04ef7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   287648 406a545c9ba766dc7cb24082b2c3a482
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   115848 c751a0d23abd4b64543274c493c37115
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   116504 8fd087f1bcc466e17b9f2760f83035e9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1922480 6b8174ee79ad890c64ae95938410232e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  2425262 0ce7eeca8abdcee675772eadf1a5aeca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc-smp_2.6.15-25.43_powerpc.deb
      Size/MD5:   865852 2da28f0985e5952dc12766b962f36ef5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc64-smp_2.6.15-25.43_powerpc.deb
      Size/MD5:   857492 b548be24713af5884601808c23c00d58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25-powerpc_2.6.15-25.43_powerpc.deb
      Size/MD5:   862646 34b20d1dbb695c35845b8be539e20829
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-25_2.6.15-25.43_powerpc.deb
      Size/MD5:  6930880 962055cdefb409ec8ee7b1c48ba3d1d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc-smp_2.6.15-25.43_powerpc.deb
      Size/MD5: 22654004 e13307b4c56dc2b876e9d304a421ae42
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc64-smp_2.6.15-25.43_powerpc.deb
      Size/MD5: 23539726 c4f00a3e4a1c2bfe0bf6c7855e0226dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-25-powerpc_2.6.15-25.43_powerpc.deb
      Size/MD5: 22239368 6e6ab2e662fa6ae523405b3cdbbf5b75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    17778 81083046a3098eebd7c8cad5a0faade1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    17380 cc27dffb7e1a52c71356d1e7b257bcf2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   261136 e7086a2889516c7d17d102f071b56967
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   282374 2a1f96e6985f667e6d885837d1a41a8e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   227450 3fb1cd1ea3d9f94fc1455da97fa2da99
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   248680 aa8403e20976904b3353011864874b3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1048440 daf2d76379b29cb0d541017b2f798f4b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1048604 822381057586dc85380674677dab1472
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1613952 83bd870b39d0969db2be991abdc8b93d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1742986 77eaa8d11058dbd0fc402bf0bea7c9f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   250840 f67a8c3647698c0105b6428c828d3eb4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   233590 25447e00f3583bb849ea493d38dddd5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    13030 5d5db387c0cf26a48427e686683a89b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    13518 eb0d22b53f99574edde2180d74c2e521
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    84830 e299c3344678891b0c15f5ebf8cd098a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    52200 698e0e885c08001128cac795580adee8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    73926 155a5dc4793be655c294a7f3d39ec6dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    85838 7b22c39eaf37f1e41498cf0cbf8540c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     6616 f6de3fe070052c2e50419f2fff5c0fc5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:     7054 6e6f1d3af07a422e64bc554551100e92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    60350 701daa37b28d00b407fa76e3abbd5740
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    70340 0440e15199b7848c8ed61b2bdb2882d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   128542 f8e34a52912d5285f02828b13584f696
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   157792 5bab493344ae46a9b3df7f3823457725
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    98860 d83a7feb0ef659e9bedcc26df0cdd16b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   113410 00bc703b6709c348be439bd11c46802f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    87246 0c171f3236189675b9a696d6dec2875e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    93266 003e03470d2abf5f01828e9ae9c10a55
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  2014976 fd00a281cfb41f77750e0255fd79e7d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:  1988776 d4aac0add83d73b30ac16c41c515d4eb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   104106 f17e7d666efae605490b74ebbcbf60b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   115712 45b06381ddb0439d7a990d558696ad58
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    12738 cd2457f9a71129d5562e43953210bd94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    14438 6ebe59fa0c35ca85961c2c60a729e862
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    39944 46beddacbcaad812036ea2ae83304870
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    41474 4babf9e0e3e7045118381a2d41f69363
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   148956 f0ebd53c68a7506531dcbba82c6f2056
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   167576 e4814de3fb38a5ca3fcc3cbbaf6c165f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    42180 753e03b346c615d74bca769f772a170e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:    44782 51e8b6f55b5079d70b780dc76e1455fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-powerpc-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   320286 901810126bfdd12898079fdfe42afb1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-25-powerpc64-smp-di_2.6.15-25.43_powerpc.udeb
      Size/MD5:   324708 66d39b3869725a185b9820e6556b48de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23460 19544e6b3fd48111ff45b92fb27ee30b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23396 fb1f77bc33f02624a0580aafbb359f0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23458 b9115c2bf2f8d0e47d7000dd027fbbe2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23396 27d848a39bd8608ba14526ba09e79730
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23416 fdf9ff4efbafe1dcddae0ca84c58e42c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23426 552617cd354016e19d22cde094c27f54
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23350 4574c742184f09feeabeed2e5d98d67b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23458 74669c0c3c5defabab5b56954a316dee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23388 95289d6bf39c291a518d4c5806d50f2d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 7684c29de740fa27c98c4a5cbc1366f9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23388 afc3dbdd9891df599e390190d3450e21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23414 52179494e250d129fa119985beed1f75
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23420 d6e5aa0c0dc1a12a82615c7b8ba5c98a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23346 66877044add2d0aebbda7a184535881a
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 2b45943741dd7af5aa6a0d7463b42d73
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power3_2.6.15.23_powerpc.deb
      Size/MD5:    23390 ea3dc64d743738a893d50f3cccb9ee0b
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23456 e60ce27af7998255a7fc39186088294c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-power4_2.6.15.23_powerpc.deb
      Size/MD5:    23392 0eac7d5aef3e8d4c0e7f9b7dbbae28ca
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23428 6c94c32784b35b16ca7dadee22a7991c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc64-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23424 9d353b900b956b53349b82db5464bf2c
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23360 6baaca22ebf1de91a5a19c1cbd2a87db
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-powerpc-smp_2.6.15.11-2_powerpc.deb
      Size/MD5:  1339334 524f7410c1746fe27fddcd5f73dafcdc
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/linux-restricted-modules-2.6.15-25-powerpc_2.6.15.11-2_powerpc.deb
      Size/MD5:  1335366 7eab1b03ae6f0caaf8f287eaa15c95ef
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc-smp_2.6.15.23_powerpc.deb
      Size/MD5:    23444 a21dee0187c0a9859209ddc35641d978
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-meta/linux-restricted-modules-powerpc_2.6.15.23_powerpc.deb
      Size/MD5:    23376 4def5627e2af081233ed55275afb0dc9
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-firmware-2.6.15-25-powerpc-di_2.6.15.11-2_powerpc.udeb
      Size/MD5:   799410 8d4e004017a5b30e7cf934a71a5995b2
    http://security.ubuntu.com/ubuntu/pool/restricted/l/linux-restricted-modules-2.6.15/nic-restricted-modules-2.6.15-25-powerpc-di_2.6.15.11-2_powerpc.udeb
      Size/MD5:   508178 7b08d3eaf48e07a05288d1ac9d1678a1

    

- 漏洞信息 (F47549)

Debian Linux Security Advisory 1097-1 (PacketStormID:F47549)
2006-06-21 00:00:00
Debian  debian.org
advisory,remote,denial of service,arbitrary,kernel,local,vulnerability
linux,debian
CVE-2006-0038,CVE-2006-0039,CVE-2006-0741,CVE-2006-0742,CVE-2006-1056,CVE-2006-1242,CVE-2006-1343,CVE-2006-1368,CVE-2006-1524,CVE-2006-1525,CVE-2006-1857,CVE-2006-1858,CVE-2006-1864,CVE-2006-2271,CVE-2006-2272,CVE-2006-2274
[点击下载]

Debian Security Advisory 1097-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1097-1                    security@debian.org
http://www.debian.org/security/                   Dann Frazier, Troy Heber
June 14th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kernel-source-2.4.27
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742
                 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368
                 CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858
                 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274
Debian Bug     : 

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2006-0038

    "Solar Designer" discovered that arithmetic computations in netfilter's
    do_replace() function can lead to a buffer overflow and the execution of
    arbitrary code. However, the operation requires CAP_NET_ADMIN privileges,
    which is only an issue in virtualization systems or fine grained access
    control systems.

CVE-2006-0039

    "Solar Designer" discovered a race condition in netfilter's
    do_add_counters() function, which allows information disclosure of
    kernel memory by exploiting a race condition. Like CVE-2006-0038,
    it requires CAP_NET_ADMIN privileges.

CVE-2006-0741

    Intel EM64T systems were discovered to be susceptible to a local
    DoS due to an endless recursive fault related to a bad ELF entry
    address.

CVE-2006-0742

    incorrectly declared die_if_kernel() function as "does never
    return" which could be exploited by a local attacker resulting in
    a kernel crash.

CVE-2006-1056

    AMD64 machines (and other 7th and 8th generation AuthenticAMD
    processors) were found to be vulnerable to sensitive information
    leakage, due to how they handle saving and restoring the FOP, FIP,
    and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
    pending. This allows a process to determine portions of the state
    of floating point instructions of other processes.

CVE-2006-1242

    Marco Ivaldi discovered that there was an unintended information
    disclosure allowing remote attackers to bypass protections against
    Idle Scans (nmap -sI) by abusing the ID field of IP packets and
    bypassing the zero IP ID in DF packet countermeasure. This was a
    result of the ip_push_pending_frames function improperly
    incremented the IP ID field when sending a RST after receiving
    unsolicited TCP SYN-ACK packets.

CVE-2006-1343

    Pavel Kankovsky reported the existance of a potential information leak
    resulting from the failure to initialize sin.sin_zero in the IPv4 socket
    code.

CVE-2006-1368

    Shaun Tancheff discovered a buffer overflow (boundry condition
    error) in the USB Gadget RNDIS implementation allowing remote
    attackers to cause a DoS. While creating a reply message, the
    driver allocated memory for the reply data, but not for the reply
    structure. The kernel fails to properly bounds-check user-supplied
    data before copying it to an insufficiently sized memory
    buffer. Attackers could crash the system, or possibly execute
    arbitrary machine code.

CVE-2006-1524

    Hugh Dickins discovered an issue in the madvise_remove() function wherein
    file and mmap restrictions are not followed, allowing local users to
    bypass IPC permissions and replace portions of readonly tmpfs files with
    zeroes.

CVE-2006-1525

    Alexandra Kossovsky reported a NULL pointer dereference condition in
    ip_route_input() that can be triggered by a local user by requesting
    a route for a multicast IP address, resulting in a denial of service
    (panic).

CVE-2006-1857

    Vlad Yasevich reported a data validation issue in the SCTP subsystem
    that may allow a remote user to overflow a buffer using a badly formatted
    HB-ACK chunk, resulting in a denial of service.

CVE-2006-1858

    Vlad Yasevich reported a bug in the bounds checking code in the SCTP
    subsystem that may allow a remote attacker to trigger a denial of service
    attack when rounded parameter lengths are used to calculate parameter
    lengths instead of the actual values.

CVE-2006-1864

    Mark Mosely discovered that chroots residing on an SMB share can be
    escaped with specially crafted "cd" sequences.

CVE-2006-2271

    The "Mu security team" discovered that carefully crafted ECNE chunks can
    cause a kernel crash by accessing incorrect state stable entries in the
    SCTP networking subsystem, which allows denial of service.

CVE-2006-2272

    The "Mu security team" discovered that fragmented SCTP control
    chunks can trigger kernel panics, which allows for denial of
    service attacks.

CVE-2006-2274

    It was discovered that SCTP packets with two initial bundled data
    packets can lead to infinite recursion, which allows for denial of
    service attacks.



The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

                                 Debian 3.1 (sarge)
     Source                      2.4.27-10sarge3
     Alpha architecture          2.4.27-10sarge3
     ARM architecture            2.4.27-2sarge3
     Intel IA-32 architecture    2.4.27-10sarge3
     Intel IA-64 architecture    2.4.27-10sarge3
     Motorola 680x0 architecture 2.4.27-3sarge3
     Big endian MIPS             2.4.27-10.sarge3.040815-1
     Little endian MIPS          2.4.27-10.sarge3.040815-1
     PowerPC architecture        2.4.27-10sarge3
     IBM S/390 architecture      2.4.27-2sarge3
     Sun Sparc architecture      2.4.27-9sarge3

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     fai-kernels                 1.9.1sarge2
     kernel-image-2.4.27-speakup 2.4.27-1.1sarge2
     mindi-kernel                2.4.27-2sarge2
     systemimager                3.2.3-6sarge2

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      831 fac953b669c78c37ea181597402b1c1b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    98672 717a42fcf8a6b67690a756b9f3f00aa1
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.diff.gz
      Size/MD5 checksum:     3962 fc1912f815afb314558fbadae87e43fc
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.tar.gz
      Size/MD5 checksum:    26319 368860bca1219d5777ab12dbc0713985
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1139 47ebcb365d37d7321eeee65b23920a29
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2.dsc
      Size/MD5 checksum:      621 096115eaec61120211e0ba317b92def9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:    31646 1673537490a1af1a72ff1d65cd73139d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc
      Size/MD5 checksum:      876 2340c14db87e56a98e01dd17b095b7d4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz
      Size/MD5 checksum:    21264 932ad64503240eedef626a0856fe5665
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1143 60abbaf01fa8d0f6ac0992eb08cb965e
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.dsc
      Size/MD5 checksum:      732 738178383acc2853cf8bd8b15861dc52
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.tar.gz
      Size/MD5 checksum: 15975839 9d7e6b12846c71e4d530375aacd1390b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge3.tar.gz
      Size/MD5 checksum:     9362 52942076ea9989d63ec619d0be8f324c
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      900 6a5fd70b803f4a0996b994d72d30c65e
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
      Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc
      Size/MD5 checksum:     1051 e28f324bd15f8825721c36d2ad685f8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz
      Size/MD5 checksum:    11080 2813b0290efcd984fef6a69d9ca3c8e7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:  1463783 1df6018893f9772d156ccf8e3080fb2b
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.+gz
      Size/MD5 checksum:   309066 ccf2db5585e30dd27b9eaf8d74285e70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc
      Size/MD5 checksum:      839 2f9746e3d73001a774607a2e8460dec8
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2.dsc
      Size/MD5 checksum:      750 621fb9f1f76dc3fae5ed69f393ded2cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    54501 650afb6ddf33bd3c55d036c6e163f8d1
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz
      Size/MD5 checksum:   741011 dc1085a42970fbb6f5174f8dae7f5bb2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc
      Size/MD5 checksum:     1581 a0f54f9d6f61b4a31bdf49b2efa6a2ca
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge2.tar.gz
      Size/MD5 checksum:    17809 946929349518ac3d91c42825bfb6cabc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.tar.gz
      Size/MD5 checksum:    31177 2d05a7a176dba04f37719199efa494b7
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
      Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge3.dsc
      Size/MD5 checksum:      831 4aa4330d08a7829fbe9a548d1d8bab2f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc
      Size/MD5 checksum:     1074 ef1ed7e19152004e160a48d320fed490
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge2.dsc
      Size/MD5 checksum:     1012 271d488ce319e95d567143228330e9a1


  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30482 64658643dc4a9554a722ff1b724c916f
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  4759092 15c5bd7f61d7291f1267c12733ffcb5b
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum: 31033502 47eb2bd29ad34555156eac2ec8160cd4
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:    26664 88c43bac04065e47b6486bed94692e9e
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:  3580108 9542a6368e1668c0b3dd5529ba9c80f0
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   116802 a73dc8e6bb5119c7679d97d13b94cbc8
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    30730 7cafd2b593e33cd0cb1ed5577a63142a
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge2_all.deb
      Size/MD5 checksum:  2419762 5e9e5072a78be7f12f2a499ee1116268
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:    15944 00be5d0f60f2e89dec74ec2a76310638
    http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb
      Size/MD5 checksum:   689772 9054c12e58f6b8c6d7f6055e94e3e2b3
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:   631336 01476ba30e300b6b91a9a1a5d5c7f16b
    http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge2_all.deb
      Size/MD5 checksum:  9545000 c225981a19829b44b8b2e61beea177c2

 
  Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge3_alpha.+deb
      Size/MD5 checksum:   272284 56ec516e9425c915a04a2a7184d15192
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge3_alpha.de+b
      Size/MD5 checksum: 16521602 4975ec76eb158179d36de7746cab88ba
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb      Size/MD5 checksum: 16966302 9bb2d088907ead2c2e689c139e945ef9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:  4573588 ad755c6e0a640be87f44d0eeb3cb0b9d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:     6930 5af591a1a57ca5b7b5ce7af39d0c30f8
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb
      Size/MD5 checksum:   274064 b675644b9520620077d740f5033e311c


  ARM architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3145470 0e5c53017bbb7a84d554c1b6e60a0f6a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  3668438 2c00f060b5f4a599b1509e5625d766c1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  7331276 8ded6d50afd88d04fd9b601586509d32
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:   465160 61a35d05b6e9617ea9cec7ecc3ada43c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1692044 73cb9319b752cc5eaca4849e20edf6ed
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  4658994 b790e6512cd56ac98a1d9b5539c9d5b6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb
      Size/MD5 checksum:  1056874 a03e9282e21db6a8094c8f2432a88e09


  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12087676 c53fd67452bade39a41a4d07b1ddbd26
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   268890 b867a4d295e544fff9f5f0aa2a660762
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11713818 a039669989458b154e77063b9f2cd05e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_+i386.deb
      Size/MD5 checksum:   305120 bcbd70a2fc6c58ecf1ff373e398069bd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   300776 cba2acbaa7a11221bf20476dec02cc2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12340196 bb4547bd7a55cf5a863faf0eb787af72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:     9460 a52b72284e9b2ac4ea7249b9889dae97
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   293320 0cfddb9db531337f9220c787e2916002
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   299132 cf2755d7c9628bf753d4f9fc59df37f6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12682330 64e091ae35b42450a3f0af1af1b1cc17
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298354 03343347f66f3ebae64348769a8e7085
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb      Size/MD5 checksum:   298796 d5474dcad0aa041fa1bebffa5531a4cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   298168 29f6f0af6edcc6fdc7b34fd33b4b45a6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   298236 251b20906cabdabc2689f8fad6238485
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 11049672 7c1d176724d5af7ef5d92cf91a4b3a24
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.de+b
      Size/MD5 checksum:   300914 012fa2195bea70f63022c38ee8ece1b8
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge2_i386.deb
      Size/MD5 checksum: 11992030 37b9f69b34c25ffd7f79c3dccb1c2b86
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:  1824238 b412dad8e3fa8ffbb88f9e24b720682c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i+386.deb
      Size/MD5 checksum:   293678 293d14c82e8f2dc12d75d9ffbf07a497
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge2_i386.de+b
      Size/MD5 checksum:  4771964 810af192d449f6437de9c7b92bfc8f70
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12420578 5699a644c8305231c6ff00ca615bc79a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum:   299016 8269e91daebb2aca7b360c15a41fa060
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb
      Size/MD5 checksum: 12024800 595b16fd83e6ca0ca9b3b4df82934f72
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.+deb
      Size/MD5 checksum:   287484 80953396a754c47e76dc9c034fb2caab
    http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge2_i386.deb
      Size/MD5 checksum:  7766984 0f4f4f9d1a0bc59ae4a2bf51734cfdfa
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386+.deb
      Size/MD5 checksum:   299566 6165de4b3a2f79b3983d826f490f6c58
    http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb
      Size/MD5 checksum: 11303960 3519c2d9f88bcbbe6cd1a793bc21a092


  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia+64.deb
      Size/MD5 checksum:   241990 1de0bc8938c45fdc763edc8b5be16dbb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.d+eb
      Size/MD5 checksum:   240416 d711a15e48958eaf0b0cffdb9afbe33b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb      Size/MD5 checksum: 16623356 6f87ed371e352b5ef736eeb9aea9b1e3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.+deb
      Size/MD5 checksum: 17020414 9748928c4403f7d1f708e4f1659ee56b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia6+4.deb
      Size/MD5 checksum:   241792 3f041268f31bbc7c13bb41f4b9b254d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64+.deb
      Size/MD5 checksum: 16980154 c21794a39eae3611d166574bc4d6c946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6188 510517c085a54b7f62b21fa549a28254
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6154 0ffa2668983b76eb117180f4127f443f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum: 16670542 5a5fc027a7ed1ea22de65134816ac27e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6372 9091687f1ccdd0a95238d4d8bf7a36b4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6150 6862682a204020d9be7c3c7a24b58022
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:  4688294 fec3cf9e850845e1339b39eaadbfe411
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge3_ia64.de+b
      Size/MD5 checksum:   240852 525e38de6f834e7112097c26da92b929
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge3_ia64.deb
      Size/MD5 checksum:     6178 c756f53c98ab21e53f097b2859433591


  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2395830 74f11a8ca02e8a1cc776bf950e1d346b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2476584 4baad67d5c9bac3ee608a1f5b1d4dce0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2638370 76fcbcdc52016ae4feeafa765a3fc761
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2261274 baacace88b258a02d89ee5158269dc90
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2324432 202215777ec6ddca992a02551578bd20
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb
      Size/MD5 checksum:  2543516 00b54f06d0e048692fec00cc8f888cf3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb      Size/MD5 checksum:  2395344 9326ce159e507c20e26fc4aa4ec9fa61


  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3852294 0b6ccfb76fed8400f453953d7421c2a6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_+mips.deb
      Size/MD5 checksum:  3849540 57d70bee7ad3a52c2e41296a4b660748
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.de+b
      Size/MD5 checksum:  4681678 76bfca90e34781e213f64d92e412f7d2
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mips.deb
      Size/MD5 checksum:  7177648 16b29faa543ea16b0f0b1e4b79bcca92
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb
      Size/MD5 checksum:    19330 f81dbe5f0089f55ccffdb5160fc14529


  Little endian MIPS architecture:
 

    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.04081+5-1_mipsel.deb
      Size/MD5 checksum:  7040154 219d79c89034cc245aaedcc09c077253
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb
      Size/MD5 checksum:    19372 f882ee84e76926b99370922778731da6
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  3031408 2e21dc55f4e6c7d8e31485cab88b52a9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_+mipsel.deb
      Size/MD5 checksum:  2991822 83720b4706c20d32513fdc764e19a3db
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.+deb
      Size/MD5 checksum:  4686362 1e70d957d920f262ad64af693ead756d
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-+1_mipsel.deb
      Size/MD5 checksum:  4102944 4dcc900ca58f7d7e69f0020bb3237dda
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1+_mipsel.deb
      Size/MD5 checksum:  2137112 45fe0699fea23090cc4bc9368c6060e9
    http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_m+ipsel.deb
      Size/MD5 checksum:  4670600 64746373b5c99a31c486fb360ec9048c
 

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:   155366 c357bb9b9fe6ce282b9bba63a0bdaec4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum: 13478728 3e7a96afb9b6bb0618a69d490d3df3e6
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge3_powerp+c.deb
      Size/MD5 checksum:  4800960 668fb5a82d4ac36e66da1abff65e531f
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum: 12750476 7f6aa3d1cc7c8990cf5ca2d8f5d5c128
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:     9868 61edb2922c82b932b5a51aabd4e3e962
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:    66712 0f1a666913413ccac067b519949b64be
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge3_powerpc.d+eb
      Size/MD5 checksum:  4683234 1dc1ed36b3052d676aece64519c79067
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:   141276 627427945710a84e25f9a6e81cf52871
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:  1817290 168aae93e0888603a192acfb55c17ea4
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:  2499398 6c3464992e5fd4f0c76bd6e456603b69
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum:   155380 29ef8c314e3ff4ad80a159e336f30cdd
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge3_powerpc.deb      Size/MD5 checksum:   141508 23beb8633e1bc6c71cd7c85549ddc547
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge3_powerpc.+deb
      Size/MD5 checksum:  4693350 489de2e942db258045c9a759940ae7a7
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge3_powerpc.de+b
      Size/MD5 checksum:     9944 b5f469592bb45ae907c251aa762e5cdb
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge3_powe+rpc.deb
      Size/MD5 checksum: 13785644 b44ad17d6469962e8ad89a36e0069b0a
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge3_po+werpc.deb
      Size/MD5 checksum:   155614 df66fe84dfcd04edc663ecfc295d5a60


  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge3_s390.deb      Size/MD5 checksum:   993502 707589c970f190bed95035dad442b9d3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  4578888 53c705bdfebbd3e6985807f041e94612
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2970498 9c2e84a24bb629db2544929cf19f2087
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge3_s390.deb
      Size/MD5 checksum:  2778530 d7d6115aa9292ff635476cd2b17bf499


  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:  2024732 192d85db979604781d849025a1f44ef2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  6546074 5865128021dbbc98f9a6c20e6fc574d9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  6379672 b308de13ac8b140e4a4d06ccd500b9e6
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc+.deb
      Size/MD5 checksum:  3787334 543e98f2a917fbc57bf8a02c580491eb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   165654 db2c3fd02eb51afbc1ccc98152a25784
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   202328 7df862f501733bef8450ba2bacc97b2a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_spa+rc.deb
      Size/MD5 checksum:   203806 5f0bc79951ced443e6ef009010b679f2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.d+eb
      Size/MD5 checksum:   163860 ccb65e6e653600dfdbe81fb9f0839789
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb
      Size/MD5 checksum:     9496 00a3aaa8a2c3cb84274e1155d0663fd1
    http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb      Size/MD5 checksum:  3601802 050ad637bd78c94c8819e553a50b51ae


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEkE03Xm3vHE4uyloRAgWkAKCizwMprLUoRTgrm24rKhy0Aq2KBgCfXUZW
VtJv32nxyaV0CN7g+A8yj7o=
=Y5TI
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F46415)

Trustix Secure Linux Security Advisory 2006.26 (PacketStormID:F46415)
2006-05-21 00:00:00
Trustix  http.trustix.org
advisory,kernel,vulnerability
linux
CVE-2006-2271,CVE-2006-2272,CVE-2006-2274,CVE-2006-2275,CVE-2006-1864
[点击下载]

Trustix Secure Linux Security Advisory #2006-0026 - Multiple kernel vulnerabilities have been fixed for Trustix Secure Linux 3.0.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0026

Package names:	   kernel
Summary:           Multiple vulnerabilities
Date:              2006-05-12
Affected versions: Trustix Secure Linux 3.0

- --------------------------------------------------------------------------
Package description:
  kernel
  The kernel package contains the Linux kernel (vmlinuz), the core of
  your Trustix Secure Linux operating system. The kernel handles the 
  basic functions of the operating system: memory allocation, process 
  allocation, device input and output, etc.

Problem description:
  kernel < TSL 3.0 >
  - New Upstream.
  - SECURITY Fix: An error in the Stream Control Transmission Protocol
    (SCTP) code that uses incorrect state table entries when certain
    ECNE chunks are received in CLOSED state, could be exploited by
    attackers to cause a kernel panic via a specially crafted packet.
  - An error exist when handling incoming IP-fragmented SCTP control
    chunks, which could be exploited by attackers to cause a kernel
    panic via a specially crafted packet.
  - Linux SCTP (lksctp) allows remote attackers to cause a denial of
    service (infinite recursion and crash) via a packet that contains
    two or more DATA fragments, which causes an skb pointer to refer
    back to itself when the full message is reassembled, leading to
    infinite recursion in the sctp_skb_pull function
  - Linux SCTP (lksctp) allows remote attackers to cause a denial of
    service (deadlock) via a large number of small messages to a receiver
    application that cannot process the messages quickly enough, which
    leads to "spillover of the receive buffer."
  - A vulnerability has been identified due to an input
    validation error when processing arguments containing backslash
    ("\\") characters passed to certain commands (e.g. "cd"),
    which could be exploited by authenticated attackers to escape
    chroot restrictions for a CIFS or SMBFS mounted filesystem.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2006-2271, CVE-2006-2272, CVE-2006-2274,
    CVE-2006-2275 and CVE-2006-1864 to these issues.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0026/>


MD5sums of the packages:
- --------------------------------------------------------------------------
9f798a0d9d3063d3fbd94119db77f40b  3.0/rpms/kernel-2.6.16.15-1tr.i586.rpm
cab3a8f7fbb1c59440a78936f3ec12b9  3.0/rpms/kernel-doc-2.6.16.15-1tr.i586.rpm
fe373ad5547b0973b49151bc5966d517  3.0/rpms/kernel-headers-2.6.16.15-1tr.i586.rpm
4dc3b1de6016983425b017045b9c218c  3.0/rpms/kernel-smp-2.6.16.15-1tr.i586.rpm
f1f8e1a0250f3a54025de929361485b0  3.0/rpms/kernel-smp-headers-2.6.16.15-1tr.i586.rpm
7430924bf1455b18a4fe661142e64758  3.0/rpms/kernel-source-2.6.16.15-1tr.i586.rpm
da6d9d50cf84d9d309006a7e38549ff0  3.0/rpms/kernel-utils-2.6.16.15-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEZHINi8CEzsK9IksRAot4AJ45nJurf7ox5v1Rv6Htg4p0apGRrwCbBm1L
+K/vdfWGhKbmKZuW24TtDeM=
=Rzi2
-----END PGP SIGNATURE-----
    

- 漏洞信息

25632
Linux Kernel SCTP ECNE Chunk Handling Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown Vendor Verified

- 漏洞描述

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is triggered because of a flow in the kernel's Stream Control Transmission Protocol (SCTP). When a crafted 'ECNE chunk' SCTP is sent to the system, an incorrect state table entry might be created when the packet is received in closed state. This might result in a kernel panic and hence loss of availability for the platform.

- 时间线

2006-05-09 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.4.33, 2.6.17 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Linux Kernel Multiple SCTP Remote Denial of Service Vulnerabilities
Design Error 17910
Yes No
2006-05-09 12:00:00 2007-01-18 05:00:00
This issue was discovered by the Mu Security research team.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
S.u.S.E. UnitedLinux 1.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
Red Hat Fedora Core5
Red Hat Fedora Core4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.16 13
Linux kernel 2.6.16 .9
Linux kernel 2.6.16 .8
Linux kernel 2.6.16 .7
+ Trustix Secure Enterprise Linux 2.0
+ Trustix Secure Linux 2.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Linux kernel 2.6.16 .5
Linux kernel 2.6.16 .4
Linux kernel 2.6.16 .3
Linux kernel 2.6.16 .2
Linux kernel 2.6.16 .11
Linux kernel 2.6.16 .1
Linux kernel 2.6.16
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8710 CM 3.1
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8700 CM 3.1
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8500 CM 3.1
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya S8300 CM 3.1

- 漏洞讨论

The Linux kernel SCTP module is susceptible to remote denial-of-service vulnerabilities. These issues are triggered when the kernel handles unexpected SCTP packets.

These issues allow remote attackers to trigger kernel panics, denying further service to legitimate users.

Note that a valid SCTP endpoint must be listening.

The Linux kernel version 2.6.16 is vulnerable to these issues; prior versions may also be affected.

- 漏洞利用

To exploit this issue, a remote attacker uses an application that creates SCTP network packets.

- 解决方案

Fixes have been committed to the Linux kernel source-control repository.

Please see the references for vendor advisories and fixes.


Linux kernel 2.6.16 .3

Linux kernel 2.6.16 13

Linux kernel 2.6.16 .9

Linux kernel 2.6.16 .11

Linux kernel 2.6.16 .5

Linux kernel 2.6.16 .1

Linux kernel 2.6.16 .2

Linux kernel 2.6.16 .8

Linux kernel 2.6.16 .4

Linux kernel 2.6.16

Linux kernel 2.6.16 .7

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站