CVE-2006-2934
CVSS5.0
发布时间 :2006-06-30 17:05:00
修订时间 :2012-03-19 00:00:00
NMCOPS    

[原文]SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.


[CNNVD]Linux Kernel Netfilter SCTP conntrack 拒绝服务漏洞(CNNVD-200606-612)

        Linux kernel 2.6.17.3之前的2.6.17版本以及2.6.16.23之前的2.6.16版本的netfilter中的SCTP conntrack (ip_conntrack_proto_sctp.c),可让远程攻击者通过没有任何区块的数据包使变量包含无效值(稍后会使用此值取消引用指针),从而导致系统拒绝服务(崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-399 [资源管理错误]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.16.18Linux Kernel 2.6.16.18
cpe:/o:linux:linux_kernel:2.6.17Linux Kernel 2.6.17
cpe:/o:linux:linux_kernel:2.6.17.2Linux Kernel 2.6.17.2
cpe:/o:linux:linux_kernel:2.6.16Linux Kernel 2.6.16
cpe:/o:linux:linux_kernel:2.6.16.19Linux Kernel 2.6.16.19
cpe:/o:linux:linux_kernel:2.6.16.22Linux Kernel 2.6.16.22
cpe:/o:linux:linux_kernel:2.6.16.11Linux Kernel 2.6.16.11
cpe:/o:linux:linux_kernel:2.6.16.12Linux Kernel 2.6.16.12
cpe:/o:linux:linux_kernel:2.6.16.20Linux Kernel 2.6.16.20
cpe:/o:linux:linux_kernel:2.6.16.13Linux Kernel 2.6.16.13
cpe:/o:linux:linux_kernel:2.6.17.1Linux Kernel 2.6.17.1
cpe:/o:linux:linux_kernel:2.6.16.14Linux Kernel 2.6.16.14
cpe:/o:linux:linux_kernel:2.6.16.2Linux Kernel 2.6.16.2
cpe:/o:linux:linux_kernel:2.6.16.17Linux Kernel 2.6.16.17
cpe:/o:linux:linux_kernel:2.6.16.1Linux Kernel 2.6.16.1
cpe:/o:linux:linux_kernel:2.6.16.10Linux Kernel 2.6.16.10
cpe:/o:linux:linux_kernel:2.6.16.15Linux Kernel 2.6.16.15
cpe:/o:linux:linux_kernel:2.6.16.16Linux Kernel 2.6.16.16
cpe:/o:linux:linux_kernel:2.6.16.21Linux Kernel 2.6.16.21

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10932SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote at...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2934
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-612
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/717844
(UNKNOWN)  CERT-VN  VU#717844
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387
(PATCH)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git;a=commit;h=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9
(PATCH)  CONFIRM  http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git;a=commit;h=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9
https://issues.rpath.com/browse/RPL-488
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-488
http://www.vupen.com/english/advisories/2006/2623
(VENDOR_ADVISORY)  VUPEN  ADV-2006-2623
http://www.ubuntu.com/usn/usn-346-1
(UNKNOWN)  UBUNTU  USN-346-1
http://www.ubuntu.com/usn/usn-331-1
(UNKNOWN)  UBUNTU  USN-331-1
http://www.securityfocus.com/bid/18755
(UNKNOWN)  BID  18755
http://www.securityfocus.com/archive/1/archive/1/439483/100/100/threaded
(UNKNOWN)  BUGTRAQ  20060707 rPSA-2006-0122-1 kernel
http://www.securityfocus.com/archive/1/439610/100/100/threaded
(UNKNOWN)  BUGTRAQ  20060710 Re: rPSA-2006-0122-1 kernel
http://www.redhat.com/support/errata/RHSA-2006-0575.html
(UNKNOWN)  REDHAT  RHSA-2006:0575
http://www.osvdb.org/26963
(UNKNOWN)  OSVDB  26963
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:047
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:042
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
(UNKNOWN)  MANDRIVA  MDKSA-2006:151
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3
(UNKNOWN)  CONFIRM  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23
(UNKNOWN)  CONFIRM  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://secunia.com/advisories/22417
(VENDOR_ADVISORY)  SECUNIA  22417
http://secunia.com/advisories/21934
(VENDOR_ADVISORY)  SECUNIA  21934
http://secunia.com/advisories/21614
(VENDOR_ADVISORY)  SECUNIA  21614
http://secunia.com/advisories/21498
(VENDOR_ADVISORY)  SECUNIA  21498
http://secunia.com/advisories/21465
(VENDOR_ADVISORY)  SECUNIA  21465
http://secunia.com/advisories/21298
(VENDOR_ADVISORY)  SECUNIA  21298
http://secunia.com/advisories/21179
(VENDOR_ADVISORY)  SECUNIA  21179
http://secunia.com/advisories/20986
(VENDOR_ADVISORY)  SECUNIA  20986
http://secunia.com/advisories/20917
(VENDOR_ADVISORY)  SECUNIA  20917

- 漏洞信息

Linux Kernel Netfilter SCTP conntrack 拒绝服务漏洞
中危 资源管理错误
2006-06-30 00:00:00 2006-07-12 00:00:00
远程  
        Linux kernel 2.6.17.3之前的2.6.17版本以及2.6.16.23之前的2.6.16版本的netfilter中的SCTP conntrack (ip_conntrack_proto_sctp.c),可让远程攻击者通过没有任何区块的数据包使变量包含无效值(稍后会使用此值取消引用指针),从而导致系统拒绝服务(崩溃)。

- 公告与补丁

        目前厂商已经发布了相关补丁,请到厂商的主页下载:
        S.u.S.E. Linux Professional 10.1
        SuSE apparmor-admin_en-10-7.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-1 0-7.5.noarch.rpm
        SuSE apparmor-docs-2.0-17.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-1 7.5.noarch.rpm
        SuSE apparmor-profiles-2.0-34.9.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2 .0-34.9.noarch.rpm
        SuSE apparmor-utils-2.0-23.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0- 23.5.noarch.rpm
        SuSE yast2-apparmor-2.0-27.5.noarch.rpm
        SUSE LINUX 10.1:
        ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0- 27.5.noarch.rpm
        Linux kernel 2.6.15
        Ubuntu acpi-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi -modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi -modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
        Ubuntu affs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs -modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
        Ubuntu affs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs -modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
        Ubuntu cdrom-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro m-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro m-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
        Ubuntu cdrom-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro m-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
        Ubuntu cdrom-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro m-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
        Ubuntu cdrom-core-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro m-core-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
        Ubuntu cdrom-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro m-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu crc-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc- modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
        Ubuntu crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc- modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
        Ubuntu crc-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc- modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
        Ubuntu crc-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc- modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
        Ubuntu crc-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
        Ubuntu 6.06 LTS
        http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc- modules-2.6.15-26-sparc64-di_2.6.15-26.46_spar

- 漏洞信息 (F49475)

Mandriva Linux Security Advisory 2006.151 (PacketStormID:F49475)
2006-08-28 00:00:00
Mandriva  mandriva.com
advisory,kernel,vulnerability
linux,mandriva
CVE-2006-1066,CVE-2006-1863,CVE-2006-1864,CVE-2006-2934,CVE-2006-2935,CVE-2006-2936,CVE-2006-3468,CVE-2006-3745
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-151 - A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:151
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : August 25, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 Prior to and including 2.6.16-rc2, when running on x86_64 systems with
 preemption enabled, local users can cause a DoS (oops) via multiple
 ptrace tasks that perform single steps (CVE-2006-1066).
 
 Prior to 2.6.16, a directory traversal vulnerability in CIFS could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1863).
 
 Prior to 2.6.16, a directory traversal vulnerability in smbfs could
 allow a local user to escape chroot restrictions for an SMB-mounted
 filesystem via "..\\" sequences (CVE-2006-1864).
 
 Prior to to 2.6.16.23, SCTP conntrack in netfilter allows remote
 attackers to cause a DoS (crash) via a packet without any chunks,
 causing a variable to contain an invalid value that is later used to
 dereference a pointer (CVE-2006-2934).
 
 The dvd_read_bca function in the DVD handling code assigns the wrong
 value to a length variable, which could allow local users to execute
 arbitrary code via a crafted USB storage device that triggers a buffer
 overflow (CVE-2006-2935).
 
 Prior to 2.6.17, the ftdi_sio driver could allow local users to cause
 a DoS (memory consumption) by writing more data to the serial port than
 the hardware can handle, causing the data to be queued (CVE-2006-2936).
 
 The 2.6 kernel, when using both NFS and EXT3, allowed remote attackers
 to cause a DoS (file system panic) via a crafted UDP packet with a V2
 lookup procedure that specifies a bad file handle (inode number),
 triggering an error and causing an exported directory to be remounted
 read-only (CVE-2006-3468).
 
 The 2.6 kernel's SCTP was found to cause system crashes and allow for
 the possibility of local privilege escalation due to a bug in the
 get_user_iov_size() function that doesn't properly handle overflow when
 calculating the length of iovec (CVE-2006-3745).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.
 
 In addition to these security fixes, other fixes have been included
 such as:
 
 - added support for new devices:
   o Testo products in usb-serial
   o ATI SB600 IDE
   o ULI M-1573 south Bridge
   o PATA and SATA support for nVidia MCP55, MCP61, MCP65, and AMD CS5536
   o Asus W6A motherboard in snd-hda-intel
   o bcm 5780
 - fixed ip_gre module unload OOPS
 - enabled opti621 driver for x86 and x86_64
 - fixed a local DoS introduced by an imcomplete fix for CVE-2006-2445
 - updated to Xen 3.0.1 with selected fixes
 - enable hugetlbfs
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1066
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1863
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3468
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 9b4811892823bfa6ddfa648f029ee500  2006.0/RPMS/kernel-2.6.12.25mdk-1-1mdk.i586.rpm
 27e6afeac2d98e07cd8a16d2ffa8de28  2006.0/RPMS/kernel-BOOT-2.6.12.25mdk-1-1mdk.i586.rpm
 dcd2a1843a5f56c286a0e6270c7b1d79  2006.0/RPMS/kernel-i586-up-1GB-2.6.12.25mdk-1-1mdk.i586.rpm
 477b78d6836d03484a58720f2137e506  2006.0/RPMS/kernel-i686-up-4GB-2.6.12.25mdk-1-1mdk.i586.rpm
 ab1f7540dbfd41f469f4931a710dbe95  2006.0/RPMS/kernel-smp-2.6.12.25mdk-1-1mdk.i586.rpm
 ed246f8b552bb26bb8e89c0c0842bbe9  2006.0/RPMS/kernel-source-2.6.12.25mdk-1-1mdk.i586.rpm
 acb15b08ed7f7d2ad3747c555a07b401  2006.0/RPMS/kernel-source-stripped-2.6.12.25mdk-1-1mdk.i586.rpm
 ede19a2f7dd7b715c58e9c61ee1c3359  2006.0/RPMS/kernel-xbox-2.6.12.25mdk-1-1mdk.i586.rpm
 848a9f9725f141077a34affb42088946  2006.0/RPMS/kernel-xen0-2.6.12.25mdk-1-1mdk.i586.rpm
 d280fd356d01831e6dbe5f0fc73c741b  2006.0/RPMS/kernel-xenU-2.6.12.25mdk-1-1mdk.i586.rpm
 c0a388efafe83a187a58d582ddf9cafb  2006.0/SRPMS/kernel-2.6.12.25mdk-1-1mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 54c6b69a3ce44d4dfb217f4b4f620293  x86_64/2006.0/RPMS/kernel-2.6.12.25mdk-1-1mdk.x86_64.rpm
 0eded734bf839d253c18d4849507a687  x86_64/2006.0/RPMS/kernel-BOOT-2.6.12.25mdk-1-1mdk.x86_64.rpm
 c379d55bcaee5070b46475b2e1cbce0a  x86_64/2006.0/RPMS/kernel-smp-2.6.12.25mdk-1-1mdk.x86_64.rpm
 2fad12f6ea68fdd1d000c2602f47a0a3  x86_64/2006.0/RPMS/kernel-source-2.6.12.25mdk-1-1mdk.x86_64.rpm
 1ae8c5f75d5660e511cfe2db62a02056  x86_64/2006.0/RPMS/kernel-source-stripped-2.6.12.25mdk-1-1mdk.x86_64.rpm
 160c2425b4be695feaafffdb59cc8fcd  x86_64/2006.0/RPMS/kernel-xen0-2.6.12.25mdk-1-1mdk.x86_64.rpm
 677a458c0eb70f9f8a5bd9553b96f589  x86_64/2006.0/RPMS/kernel-xenU-2.6.12.25mdk-1-1mdk.x86_64.rpm
 c0a388efafe83a187a58d582ddf9cafb  x86_64/2006.0/SRPMS/kernel-2.6.12.25mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFE7xpfmqjQ0CJFipgRAio9AKDjb4g8obg5dkOccjQOlFQ6oeIKAQCgkNQ3
ZdXAs/f1g9RsGP1wVlrqg+U=
=TeRg
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F49019)

Ubuntu Security Notice 331-1 (PacketStormID:F49019)
2006-08-17 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,denial of service,overflow,arbitrary,kernel,local,root
linux,ubuntu
CVE-2006-2934,CVE-2006-2935,CVE-2006-2936
[点击下载]

Ubuntu Security Notice USN-331-1 - A Denial of service vulnerability was reported in iptables' SCTP conntrack module. On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash. A buffer overflow has been discovered in the dvd_read_bca() function. By inserting a specially crafted DVD, USB stick, or similar automatically mounted removable device, a local user could crash the machine or potentially even execute arbitrary code with full root privileges. The ftdi_sio driver for serial USB ports did not limit the amount of pending data to be written. A local user could exploit this to drain all available kernel memory and thus render the system unusable.

=========================================================== 
Ubuntu Security Notice USN-331-1            August 03, 2006
linux-source-2.6.15 vulnerabilities
CVE-2006-2934, CVE-2006-2935, CVE-2006-2936
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  linux-image-2.6.15-26-386                2.6.15-26.46
  linux-image-2.6.15-26-686                2.6.15-26.46
  linux-image-2.6.15-26-amd64-generic      2.6.15-26.46
  linux-image-2.6.15-26-amd64-k8           2.6.15-26.46
  linux-image-2.6.15-26-amd64-server       2.6.15-26.46
  linux-image-2.6.15-26-amd64-xeon         2.6.15-26.46
  linux-image-2.6.15-26-hppa32             2.6.15-26.46
  linux-image-2.6.15-26-hppa32-smp         2.6.15-26.46
  linux-image-2.6.15-26-hppa64             2.6.15-26.46
  linux-image-2.6.15-26-hppa64-smp         2.6.15-26.46
  linux-image-2.6.15-26-itanium            2.6.15-26.46
  linux-image-2.6.15-26-itanium-smp        2.6.15-26.46
  linux-image-2.6.15-26-k7                 2.6.15-26.46
  linux-image-2.6.15-26-mckinley           2.6.15-26.46
  linux-image-2.6.15-26-mckinley-smp       2.6.15-26.46
  linux-image-2.6.15-26-powerpc            2.6.15-26.46
  linux-image-2.6.15-26-powerpc-smp        2.6.15-26.46
  linux-image-2.6.15-26-powerpc64-smp      2.6.15-26.46
  linux-image-2.6.15-26-server             2.6.15-26.46
  linux-image-2.6.15-26-server-bigiron     2.6.15-26.46
  linux-image-2.6.15-26-sparc64            2.6.15-26.46
  linux-image-2.6.15-26-sparc64-smp        2.6.15-26.46

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Please note that Ubuntu 5.04 and 5.10 are also affected by these
flaws. An update is in preparation and will be released shortly.

Details follow:

A Denial of service vulnerability was reported in iptables' SCTP
conntrack module. On computers which use this iptables module, a
remote attacker could expoit this to trigger a kernel crash.
(CVE-2006-2934)

A buffer overflow has been discovered in the dvd_read_bca() function.
By inserting a specially crafted DVD, USB stick, or similar
automatically mounted removable device, a local user could crash the
machine or potentially even execute arbitrary code with full root
privileges. (CVE-2006-2935)

The ftdi_sio driver for serial USB ports did not limit the amount of
pending data to be written. A local user could exploit this to drain
all available kernel memory and thus render the system unusable.
(CVE-2006-2936)

Additionally, this update fixes a range of bugs.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.diff.gz
      Size/MD5:  2176265 7e58cd466b0806ef230dd7db1bb11410
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46.dsc
      Size/MD5:     2379 d24f2db881c6169c9a1b8500ff413e5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-26.46_all.deb
      Size/MD5:  5159244 4bf4e66f6217bfe273208d9d2b12d2b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-26.46_all.deb
      Size/MD5:    88218 f9e5a58e908d0e64248e8a93df25cdda
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.46_all.deb
      Size/MD5: 44519570 d74769581d9cbcaf46cec3982078cc20

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    22354 b46dd65aaa4f67a7b0c09c97ee669a88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    44766 b7d6d5a3ea9591159a386d50467a3209
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     2312 157bdcb2afb69c6ab737c911285634c8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    36194 7a7ee0ba8f86095feb78a043eea3fc03
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   102030 8e0629b9b7a003f6f6e5bfdf30a8684d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    38614 e26a1ec7ab0ff9b0b1dbfbc4aeb79ac0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    49132 6a5e126a9e4a7a112b1669a967b2dbdb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   176752 f47339410f9371b8e62d3a882b68395c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    36768 3f47681286a0cb1d71e5a7ae72934213
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   142206 ca441b258ebe27b5f3e51344c8a75687
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    51042 ad5b0c1fcd5f74287a4b3c6c29fe4c9c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   140418 2877bf985637d6bbe468ee168469e774
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   286894 cbbc43bfed10fe2845e181e13a31f45e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    97792 2aa91b5d3be5c27c7da4b8166fcf45d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1650194 148c14b6f3cc773a3493318b1b73f4b8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-generic_2.6.15-26.46_amd64.deb
      Size/MD5:   863134 5e9c6139ac4cef1b4bf72c3ea9ba7c34
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-k8_2.6.15-26.46_amd64.deb
      Size/MD5:   859340 b058f2ce8ecf359289f878b006a784d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-server_2.6.15-26.46_amd64.deb
      Size/MD5:   865454 70d758e5e6c69fbce23fc310868d4a90
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-xeon_2.6.15-26.46_amd64.deb
      Size/MD5:   860588 06592191db1bfbe9b13a90b039314d28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_amd64.deb
      Size/MD5:  6909926 bad8cc44f50d9efc6e28e1705b0613b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-generic_2.6.15-26.46_amd64.deb
      Size/MD5: 20749454 9ce6df903e054cd8785ea9010bd8e2d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-k8_2.6.15-26.46_amd64.deb
      Size/MD5: 20729124 76af9b1873402a947978dfc297c4c769
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-server_2.6.15-26.46_amd64.deb
      Size/MD5: 21568390 ac3eec6f072a6defcf470b3068cb29e3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-xeon_2.6.15-26.46_amd64.deb
      Size/MD5: 19837954 28c26b35f0a1d6073aea751cc6a48e5f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    15622 2d71e8593af55bb6535286d928732c6d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   240268 b087baa926d9f74b6d1115d2fe3f0484
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   202556 66a1b27f1fa3df831ac2aa61372b5a98
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1048598 6727cb9477f67ccd644d3cf9654996b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1468336 e87315f8380eba996f41430689645dab
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   161646 35c8fa79d5cb7f84312344d70f3daf28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     9832 6d460e016e8caa9009e7c0100546765d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    80852 017f3b690a7deda79ae28859a1156f16
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    49166 482784e69d825679f716f588c9d08fb1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    35156 4e1d46d0ff65b856b46a645608148f18
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    70858 e762b6c646542ec7123d25d54ce039ba
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     6218 f6977d9be5d4e5b477757c61a316e2a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:     9062 568e685568ee587ba271ecb2cf21752c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    57884 4740421160ab315dbb79dbe4a2a730f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   123326 a0519604867bcbd1d18d3a3be421056c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   100582 62da7b3eb3cdd096f3d53aaf902577d1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    79198 e68d78108e5cdbe25718b393798e2264
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:  1594668 242186379984fa8716843f072eaa6587
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    72288 9dec0b23cfeea9b58fcac42d959ad514
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    12646 b28d65521fa1ec89824e4801aeef5bce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    33738 1a21457864b8cf9bbc4db127624102f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   138134 5d9cc11966e5af74bfff5173690e3564
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:    38922 f25d8ca81d5e7a5a106d2e091fd365ed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.46_amd64.udeb
      Size/MD5:   278740 7734d6570999a0f33fef87c11155cc33

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    18964 c76b9c09fa34cf0a218076ad9594eb67
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    43454 2213aea7eab3b198897b82632a505091
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   105200 f5e8536dd17c1e3d068363eedc2937cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     2280 2f497e2b47eed497583fdb8d5a3e0ce3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    34480 c353d6e2a33c49fab899b76210b15534
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    96798 1e5ae4943d47ba2da0fb4f75ce077413
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    37064 ef0e68a2ec1bf9e4ecdf13f8cbbe7fce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    44064 ff8196367f19565e1f4917c8cb20d805
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   167672 d65fcbcf877adce0b5fca9931cc099d6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    33924 6cf55b4a822e3fa382c21da77305678c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   137840 69ca55a9e0fe2e4f32e213e4ec1d97f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    46886 4e9081c94f6cf7e40adf7c9e85af81df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   132754 492686dc37c65caedde06eaed3287d42
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   273462 924a7858e13147b6a7f89aab2b5c42f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   102250 5a3b5858bc762295a9da42602ac02637
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1594890 028bff5d335b8bab020e5d0678359554
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-386_2.6.15-26.46_i386.deb
      Size/MD5:   856398 2962068982a4a35fc449914e453500d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-686_2.6.15-26.46_i386.deb
      Size/MD5:   852460 2f7e14af41df8e3f9d403f0967b46ab4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-k7_2.6.15-26.46_i386.deb
      Size/MD5:   857528 7b19ecc109a7f7632f655ff0b42b5e04
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server-bigiron_2.6.15-26.46_i386.deb
      Size/MD5:   858588 c5d09e3871e168316024f06482f26a05
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server_2.6.15-26.46_i386.deb
      Size/MD5:   856510 e6ecee80055f1d273cea08ae3a006d6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_i386.deb
      Size/MD5:  6902516 936d19f8917ae5e05224390595e1ca2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-386_2.6.15-26.46_i386.deb
      Size/MD5: 21654868 34f6cb028c963b8e5b01b479565662b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-686_2.6.15-26.46_i386.deb
      Size/MD5: 22447616 a3938cd9077bcb7b274f3d67cef547d4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-k7_2.6.15-26.46_i386.deb
      Size/MD5: 22188556 45c7695939ee428bb82bb6e448050361
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server-bigiron_2.6.15-26.46_i386.deb
      Size/MD5: 23548214 fc515956f0d12c34223f14e41f911b35
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server_2.6.15-26.46_i386.deb
      Size/MD5: 23105394 daf8c174f33d7244ddbf1cc3a0e8dd68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    15498 f825991f4ba414c74ec1bac247ae36b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   238440 aabd5a975ab5631ca9f8f82cf38eecd8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   196960 d3438f31ff987f7905a82fa25e2209d5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1048356 4701e9521d2361f9299fca5d60993c82
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1666448 d19c39a06d01fc4bf9eed4e0bb01b94b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   160814 dc17c3a40d0122c0274df2013fa57325
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     9160 b13026a2f8ad64d65a97a9b4aeed168a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    76484 b9b19266a950a275ad7984c891998608
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    53250 0ef970528317c905cda061d5ceb8fff1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    33052 da1a201964585fd53d0e349ef31648aa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    85620 b4db6cb9cd152731247f292bc1a7cc2e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     6024 c57b6ff6f47e37110466eaa52c696751
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:     8750 5f7d3f0d22778439a7998c0bcd5d6c4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    53588 8e25559416733be5bf2e720f4789977b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   130778 5029562b6e4f6571a586a5bc3cac5b84
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    98132 5b6cf1677c087d66c04a6f898d445816
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    77114 73e86308a339e3d75478677f85a93e85
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:  1768386 b601477627d639daa1b091fe3935742c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    69560 eef217d0e9afe909ddaf058303928773
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    11760 bebc7362407bf0b2f0392f21066f1440
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    35998 da990a70e403bb59b92e61b7b5be6040
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   132272 6ccf48f5e1dec0cab94178232fe63159
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:    38540 d2486293363827702c707c39959e557c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-386-di_2.6.15-26.46_i386.udeb
      Size/MD5:   299112 975134de4d987c369854b18f029a41aa

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    23724 dd0a12c21a91303fee396d4d964efd7a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    25942 883e8ffdc70f43c0474a4c2ab1b0e4fc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    49308 2997c9edb91a59111a1df4348c612e59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    51520 369cbc45b6d39ac1740a79443ed0f972
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     2304 479deb640b1a243cd50190ed5f92194f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     2474 7c51c4a431564be19f73bd1495faaa9a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    40116 c48dc950cc725cd29f2c73b7e1e27af6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    43682 219a8b33cd993282e630108d04c5f8bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   112348 988ff5c75718602266f20f00ffd09d74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   120422 00b3bb3094caea5d07c1bf99f62477e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    40848 42e0d687b2d6ab960b4136f3ae424550
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    45348 09863e051631e4eeb93deecd6d54cd8c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    29020 4438cc82d10b90091d600e9cbcbee0cd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    29890 947781ba5c4494d7eb978621a5390d83
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   211386 6b8a163f3717f793d9fd3fe37ee30c12
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   225190 a26980d515e4d6c2471c47f6e9efaf34
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    45038 f41bff445c763d0d82773113102f2b5e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    40210 2d15243f9b9156caaf16ee05ef7f5851
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     1926 cac1a938d57e96f855a680435dfea0ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     2194 98cf4cc7093771d6b5a486da248d63a8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    80586 69f438fb3c31a136bddceb9fd8ef3c3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    85942 7c80c0648522bd9b4282413f1ad7308f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   111614 30ad839daae0d35ed646957210423f28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   125762 f2e2eddff8f87bf6f3e120de6697ea71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    53402 99e59c787dbdfd2b2b3f5ee3190a354b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    58472 227124201106cc2c6ea8543325a8fec5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   147642 8e3e2ede998441155d04fcd170071762
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   161422 113c01a206c4f2b9e0ea0595243a271f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   317478 415750c046f03ff3b3cb7840353f6bdb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   287574 e0e809bbfe42506f2d7622618462244a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   115850 a4c34e2dd7f593db3715135a36b4ea39
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   116516 36fc30755a349c8357931e6df9cf0005
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1922760 7ff8ffc6d32dbaac5e5389cb20fa3b91
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  2434820 494ee46a173b063b1e4de24051c9e417
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc-smp_2.6.15-26.46_powerpc.deb
      Size/MD5:   867232 f27a2e6c82b101ee1196e2dc79235c0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc64-smp_2.6.15-26.46_powerpc.deb
      Size/MD5:   865916 f723587457a8052726c6332d978bf21d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc_2.6.15-26.46_powerpc.deb
      Size/MD5:   863582 48c2e803ec1a32d225ff015ca9dac8c4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_powerpc.deb
      Size/MD5:  6934118 811e2c48ceb71e0b73b947383879e54e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc-smp_2.6.15-26.46_powerpc.deb
      Size/MD5: 22699770 454c92d672745825e0da59b3846ea296
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc64-smp_2.6.15-26.46_powerpc.deb
      Size/MD5: 23598248 caceeea9305708281ded48af53fdb035
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc_2.6.15-26.46_powerpc.deb
      Size/MD5: 22279522 7c51a4a1d9a7f4682dba55652c7a7177
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    17774 d2109fff6a3e76f8ae00ca50c3757ac6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    17380 3e925793e6cf5143bbb90c1cc7135ca9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   261138 486f49750a441f9f08a9e028017859dd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   282372 3532a606ebccbffe4e9f0b9704343403
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   227448 ab67a542a296c15fe19f5678bfb3abd2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   248672 a642b4dc828b99a829e385c1272ffac5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1048444 693484f8e48f3ed96de600bcb263ff1d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1048586 e3e09ae489e9a42d080c7b659fcb9212
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1652058 d90ddda8561ab7c84721d9a2759410cf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1786880 82026dcc36bfb75aed01eea38663dec0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   250942 8c9a5ff088613dd58c085209574757f7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   233664 5f12bc05b5caaa8e5cc8be471da67891
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    13030 f576434ce6007be2a958a5551c2222d0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    13520 542d6c2824d61f80941e59cbb2d58ac0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    84830 12874bfa595ab09827548acbe045a377
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    52186 580497226f45e794919f37c09264f190
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    73926 2c1df413ca789def27ea7bb7b9ca2212
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    85838 ff8d5545cd5f32a2f0cf60e8e76f8efd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     6616 c07ed6e085d270ed204293c31b532616
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:     7056 b2a3e5f16342ea8c06c4f3c9b8013927
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    60354 57bc73b870551aab386c5bd729ddcb06
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    70346 57a1efe04f64935279dab390e5574a14
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   128542 29067c575f09689517acafdfd78fe888
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   157796 ba534f3a82b191acf6f55b2f08c1de4a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   107706 725f2666fcf5175d99dfa349cafeb4e7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   125538 5edca118eb1d1ae86205b8f6d749c6c9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    87246 c8dd762bd57a5f47d6dd84b300385143
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    93264 d210e9fa22278979c55f0b0c31438c7d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  2013958 770fdbfcaa3fd6adf15471718d87d25c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:  1987990 e7fa61bdb4c7e774759c162550b26d81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   104106 13d152bc0bbed1042e38a26159887a80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   115690 cc469ae29ca3b83ecbf894720f1006e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    12736 3a50330a030869bff6c7f64607ed9bc7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    14434 d6feff4e81decd9cfc8fd802d597e0ee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    39946 d83aab7883626c06c246016d8b6b5c4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    41464 ad6679188388ae6763c489ab7a61455a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   148964 d16936d026ac05ea527535911fa7631a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   167622 8591041dbb8669e645c62d96d98cf37b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    42268 448f836bf93210a77a8ffa0c6e703800
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:    44856 5646582a22b27fad6e49ce9e1bd42a44
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   320286 80c77c84a1c9aa91c9f455557f587cce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.46_powerpc.udeb
      Size/MD5:   324710 2290e406789e3c8226fbddb9738c95ca

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    50458 875448e1f1b524a0cd156c433ad2f182
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     2358 9e082f4706f2e58348fb4c7fc07c6cb2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    40236 264830e60e3acf6da02eee2b796df6bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   110300 de7f78d3e25943233e566b9c81c5dc9d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    40722 15875a4574ee354f096a01875a05626c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   104226 2ebf691549e08488b083c3426f4529f5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     7430 6da2cdc9dfa3d2029b1bb38653ce1160
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   148788 3a394409c70af60eb315728785d71d4c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1707378 c74b91b4e6e534abfee6c48223f1cc0f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64-smp_2.6.15-26.46_sparc.deb
      Size/MD5:   763904 01db8ad2865348d766cd8f980aa1dec8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64_2.6.15-26.46_sparc.deb
      Size/MD5:   763362 97689f69f840a582b6accad44da2da10
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.46_sparc.deb
      Size/MD5:  6947988 21f2e798c2ca60c611e9bdb4d4a46a92
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64-smp_2.6.15-26.46_sparc.deb
      Size/MD5: 14933382 7294c7f5961809e0859c7ed68b2f2ad1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64_2.6.15-26.46_sparc.deb
      Size/MD5: 14755230 25638ac8ff3ee3729aa21ded2806dd32
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     7418 b6f12641e9c07fbb53753ec9e7b74e08
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   248512 68377b888b50bb1c2242cae243e40d94
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   212272 82eb90e54dc8dab248c79a1bf65ef463
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1048464 85e7d26f45c8b60a243a056481fcec65
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1398990 a77e897a9b8ae4ab6e532118751a696d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    10124 a45e2d6ef98f3dce1b11193bc45216b7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    40174 abde0b7d708426b354656402819cabdc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:     9358 b5a4522ef7a12b59ce2a2576dc1f211f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    61430 1240de3c53b56a668596f4fc260c60ac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   163004 b4043645767fab694cca73be48ecdd8c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    63930 29523cd8e6d0acee2bdfa74f056ba665
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:  1235036 6e4978f60c91911ceb238ab041f616c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    59314 5ebc9851899f4eac5d201bd5dd082c19
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:    37392 53c475ecafc31e68286a2d28b4fd98e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-sparc64-di_2.6.15-26.46_sparc.udeb
      Size/MD5:   280070 971953c63a5c968257c08d9dc280ee2a
    

- 漏洞信息 (F48636)

SUSE-SA-2006-042.txt (PacketStormID:F48636)
2006-07-28 00:00:00
 
advisory,kernel,vulnerability
linux,suse
CVE-2006-0744,CVE-2006-1528,CVE-2006-1855,CVE-2006-1857,CVE-2006-1858,CVE-2006-1859,CVE-2006-1860,CVE-2006-2444,CVE-2006-2445,CVE-2006-2448,CVE-2006-2450,CVE-2006-2451,CVE-2006-2934,CVE-2006-2935,CVE-2006-3085,CVE-2006-3626
[点击下载]

SUSE Security Announcement SUSE-SA:2006:042 - A slew of kernel related vulnerabilities has been fixed in SUSE Linux for the 2.6 series.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:042
        Date:                   Wed, 26 Jul 2006 14:00:00 +0000
        Affected Products:      SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
        Vulnerability Type:     local privilege escalation
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2006-0744, CVE-2006-1528, CVE-2006-1855
                                CVE-2006-1857, CVE-2006-1858, CVE-2006-1859
                                CVE-2006-1860, CVE-2006-2444, CVE-2006-2445
                                CVE-2006-2448, CVE-2006-2450, CVE-2006-2451
                                CVE-2006-2934, CVE-2006-2935, CVE-2006-3085
                                CVE-2006-3626

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             Various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The Linux kernel has been updated to fix several security issues.

   This advisory refers to kernel updates for SUSE Linux 9.1 - 10.1.

   For the SUSE Linux Enterprise 9 and 10, Novell Linux Desktop 9, Open
   Enterprise Server products the kernel update is still in testing and
   will be released within the next week.

   SUSE Linux Enterprise 8 and SUSE Linux Desktop 1 with Linux 2.4 based
   kernels are not affected by exploitable problems in their default
   configuration and will not be updated with this security update round.

   The SUSE Linux 10.1 kernel has been updated to state of the SUSE
   Linux Enterprise 10 kernel and will continue to track it.
   The updated kernel enables convenient use of kernel module packages
   for NVIDIA and ATI drivers on SUSE Linux 10.1.
   Please see the HOWTOs on http://opensuse.org/ on how to add and use
   them. The update also includes a set of AppArmor and Kernel Module
   Package (KMP) updates.

   Following security issues fixed:
   - CVE-2006-0744: When the user could have changed %RIP always force IRET,
                    now also fixed for the UML kernel.

   - CVE-2006-1859: A memory leak in __setlease in fs/locks.c allows
                    local attackers to cause a denial of service (memory
                    consumption) via unspecified actions related to an
                    "uninitialized return value," aka "slab leak."

   - CVE-2006-1860: lease_init in fs/locks.c allows local attackers to cause a
                    denial of service (fcntl_setlease lockup) via actions
                    that cause lease_init to free a lock that might not
                    have been allocated on the stack.

   - CVE-2006-1528: Linux allows local users to cause a denial of service (crash)
                    via a Direct I/O transfer from the sg driver to memory
                    mapped (mmap) IO space.

   - CVE-2006-1855: It was possible to potentially crash the kernel by
                    using CPU timers and timing the termination of the
                    parent process.

   - CVE-2006-1857: A buffer overflow in the SCTP protocol could allow remote
                    attackers to cause a crash or possibly execute arbitrary
                    code via a malformed HB-ACK chunk.

   - CVE-2006-1858: SCTP allowed remote attackers to cause a denial of service
                    (crash) and possibly execute arbitrary code via a chunk
                    length that is inconsistent with the actual length of
                    provided parameters.

   - CVE-2006-2444: The snmp_trap_decode function in the SNMP NAT helper
                    allows remote attackers to cause a denial of service
                    (crash) via unspecified remote attack vectors that cause
                    failures in snmp_trap_decode that trigger (1) frees of
                    random memory or (2) frees of previously-freed memory
                    (double-free) by snmp_trap_decode as well as its calling
                    function, as demonstrated via certain test cases of
                    the PROTOS SNMP test suite.

   - CVE-2006-2445: A race condition in run_posix_cpu_timers allows local
                    users to cause a denial of service (BUG_ON crash)
                    by causing one CPU to attach a timer to a process that
                    is exiting.

   - CVE-2006-2448: Due to missing checking of validity of user space pointers
                    it was possible for local attackers to read any kernel
                    memory, potentially exposing sensitive data to the
                    attacker or crash the kernel.
                    This problem is PowerPC specific.

   - CVE-2006-3085: Fixed a remotely trigger able endless loop in SCTP netfilter
                    handling caused by 0 chunk length.

   - CVE-2006-2451: Due to an argument validation error in prctl(PR_SET_DUMPABLE)
                    a local attacker can easily gain administrator (root)
                    privileges.

   - CVE-2006-2934: When a SCTP packet without any chunks is received, the
                    newconntrack variable in sctp_packet contains an out of
                    bounds value that is used to look up an pointer from the
                    array of timeouts, which is then dereferenced, resulting
                    in a crash. Make sure at least a single chunk is present.

   - CVE-2006-2935: A stack based buffer overflow in CDROM / DVD handling was
                    fixed which could be used by a physical local attacker
                    to crash the kernel or execute code within kernel
                    context, depending on presence of automatic DVD handling
                    in the system.

   - CVE-2006-3626: A race condition allows local users to gain root
                    privileges by changing the file mode of /proc/self/
                    files in a way that causes those files (for instance
                    /proc/self/environ) to become setuid root.

    The SUSE Linux 9.1 kernel update is the final SUSE Linux 9.1 YOU
    update (see separate announcement from some days ago).

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes


     SPECIAL INSTALLATION INSTRUCTIONS
     =================================
     The following paragraphs guide you through the installation
     process in a step-by-step fashion. The character sequence "****"
     marks the beginning of a new paragraph. In some cases, the steps
     outlined in a particular paragraph may or may not be applicable
     to your situation. Therefore, make sure that you read through
     all of the steps below before attempting any of these
     procedures. All of the commands that need to be executed must be
     run as the superuser 'root'. Each step relies on the steps
     before it to complete successfully.


   **** Step 1: Determine the needed kernel type.

     Use the following command to determine which kind of kernel is
     installed on your system:

       rpm -qf --qf '%{name}\n' /boot/vmlinuz


   **** Step 2: Download the packages for your system.

     Download the kernel RPM package for your distribution with the
     name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
     modules that are not free were moved to a separate package with
     the suffix '-nongpl' in its name. Download that package as well
     if you rely on hardware that requires non-free drivers, such as
     some ISDN adapters. The list of all kernel RPM packages is
     appended below.

     The kernel-source package does not contain a binary kernel in
     bootable form. Instead, it contains the sources that correspond
     with the binary kernel RPM packages. This package is required to
     build third party add-on modules.


   **** Step 3: Verify authenticity of the packages.

     Verify the authenticity of the kernel RPM package using the
     methods as listed in Section 6 of this SUSE Security
     Announcement.


   **** Step 4: Installing your kernel rpm package.

     Install the rpm package that you have downloaded in Step 2 with
     the command

         rpm -Uhv <FILE>

     replacing <FILE> with the filename of the RPM package
     downloaded.

     Warning: After performing this step, your system may not boot
              unless the following steps have been followed
   	     completely.


   **** Step 5: Configuring and creating the initrd.

     The initrd is a RAM disk that is loaded into the memory of your
     system together with the kernel boot image by the boot loader.
     The kernel uses the content of this RAM disk to execute commands
     that must be run before the kernel can mount its root file
     system. The initrd is typically used to load hard disk
     controller drivers and file system modules. The variable
     INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
     modules are loaded in the initrd.

     After a new kernel rpm has been installed, the initrd must be
     recreated to include the updated kernel modules. Usually this
     happens automatically when installing the kernel rpm. If
     creating the initrd fails for some reason, manually run the
     command

       /sbin/mkinitrd


   **** Step 6: Update the boot loader, if necessary.

     Depending on your software configuration, you either have the
     LILO or GRUB boot loader installed and initialized on your
     system. Use the command

       grep LOADER_TYPE /etc/sysconfig/bootloader

     to find out which boot loader is configured.

     The GRUB boot loader does not require any further action after a
     new kernel has been installed. You may proceed to the next step
     if you are using GRUB.

     If you use the LILO boot loader, lilo must be run to
     reinitialize the boot sector of the hard disk. Usually this
     happens automatically when installing the kernel RPM. In case
     this step fails, run the command

       /sbin/lilo


     Warning: An improperly installed boot loader will render your
              system unbootable.


   **** Step 7: Reboot.

     If all of the steps above have been successfully completed on
     your system, the new kernel including the kernel modules and the
     initrd are ready to boot. The system needs to be rebooted for
     the changes to be active. Make sure that all steps have been
     completed then reboot using the command

       /sbin/shutdown -r now

     Your system will now shut down and restart with the new kernel.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv <file.rpm>

   to apply the update, replacing <file.rpm> with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/apparmor-parser-2.0-21.5.i586.rpm
          9cd9a522ee1844e945b580697cf23ad9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-1.1.3-23.3.i586.rpm
          89d2201c3dbc746ec24cf4bd4cb44559
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-devel-1.1.3-23.3.i586.rpm
          72540e4f65fd2edf1782a75114fccb9f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-libs-1.1.3-23.3.i586.rpm
          4cf153c5f2f544d0766a00fa83b3c8ef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-bigsmp-2.01_2.6.16.21_0.13-22.3.i586.rpm
          6bdf25dbf6a23a529fcb03a64b17cebf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.i586.rpm
          a844ad701dd378b34a4cadc0e4c22e6f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.i586.rpm
          dff4d32521e85e17d4f8ff6adca93949
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.i586.rpm
          cef9a15763ee6932c53ee21473cd4997
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.i586.rpm
          ba16f758468d56f1d7923db3b0904631
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-xenpae-2.01_2.6.16.21_0.13-22.3.i586.rpm
          2c43fb6f07d4bfe9b93870e5427c1895
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-0.7.18-3.3.i586.rpm
          e7b20cfae135aa61d35b7a5b21c74330
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-bigsmp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          909215493b300108c63119ab9f096d79
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          e113b1b042ae80eab80c23c4c28cf97f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          b69e5fc59ca5d0c240fd53fc98a5484a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          6c9bac44ad763009d4331401d3ac10ec
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          3188da9046488df7bed609ffd7ce54fe
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-xenpae-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          bb3ef37bcb236e56be33e14e1e367983
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-bigsmp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          b9ecda8924b39c2ef58543daeb27f35f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          410388ef1c72ff622aa163a5c2d9df4c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          afb6655fed055160232e9e88da940b24
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          23bab134a07330c207e7318843c82a79
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          4797651065a56662beb54b0a6bc88b12
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-xenpae-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          77832a824919e683087693f24db509f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-bigsmp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          57aefc602afcb1d96e386a748c84077f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          641354f8153682d9657809ff3de2ceef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          32c3dd5b3aa99ba22851a5b8437c3198
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          261b6e2cef8380c105f1175813b6652e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          2b0a21a904508d395e3fb6ae250bb97d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-xenpae-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          bdb122fa51617514703c0e6655976ecb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-bigsmp-2.6.16.21-0.13.i586.rpm
          a7cd535abc7d7369df33218549a40641
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-debug-2.6.16.21-0.13.i586.rpm
          76afdaa38402761b7a4547d346128d12
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-default-2.6.16.21-0.13.i586.rpm
          c02ef80cf6259e9c2e2367d906ddbce5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-kdump-2.6.16.21-0.13.i586.rpm
          7d2ae84459eb40f27eb27ccd17f40065
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-smp-2.6.16.21-0.13.i586.rpm
          bb548b149f045f71f0cc77cdeab3554e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-source-2.6.16.21-0.13.i586.rpm
          06f6819e6b542f818dfc1cf8b177d21c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-syms-2.6.16.21-0.13.i586.rpm
          c03b63fe79c14b963c2ca952d741507b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-um-2.6.16.21-0.13.i586.rpm
          47dfc55b417521fc8f89719a26590b8b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xen-2.6.16.21-0.13.i586.rpm
          ce2c2a0c3d8f8de549f7f9e464b215c6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xenpae-2.6.16.21-0.13.i586.rpm
          0ebf3e42683ade314e2eb216ee11de72
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kexec-tools-1.101-32.17.i586.rpm
          28f60804adcf7e5d19ec52b4d64de043
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-bigsmp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          67b4f753cc31f80de61e6c3b46511ad8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          fe279b89071ac503553a3ef9f7006ccb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          b051b17aaa7f5f3faddd7ae04e17b25b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-xenpae-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          91e65fa9b282efc42f012b27f55db16c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/mkinitrd-1.2-106.15.i586.rpm
          3f795b29fdf6a9bc66eb42c8686c7977
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/multipath-tools-0.4.6-25.9.i586.rpm
          d8dafe24a0f64529fa92a7f21acd88dd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-bigsmp-1.10_2.6.16.21_0.13-19.3.i586.rpm
          e5a0788af9f6f93be7592212fa4e1d4f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.i586.rpm
          188cdc73cf94c84cef6d9bfec587da9d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.i586.rpm
          9b8abac21a6ed044bdde306d27f97b03
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.i586.rpm
          2865814e726de3c07e4a63433e2408ae
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.i586.rpm
          d49abd0a6bd8319a6bf35665cb20e1f1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-xenpae-1.10_2.6.16.21_0.13-19.3.i586.rpm
          38bbad45bd3915010d26dd7dbf07b570
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-bigsmp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          a20595f9f88f23363aea1e281a853bb9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          e266f1647fd1d9b3fe53782249aa8017
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          21c7664b863b822b7e6fca494167dca7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          206c4c2c37edbe12a532d7df17992fe5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          74f8ee6ce6fb0ba4264027d82dedfed2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-xenpae-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          684fe3618c802c5949c16c2e23490fa7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-bigsmp-20060126_2.6.16.21_0.13-3.1.i586.rpm
          aa274c0190792577dae5400fecad7642
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.i586.rpm
          b37e5f6d1afff4d17236e781e908c4a2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.i586.rpm
          504aee4caf372688dd59254b4296a071
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.i586.rpm
          826ef0e62b77ee7db3515c4f81d918fb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.i586.rpm
          ba37438f88bb172e407d6e4db00fab9a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.i586.rpm
          3976e689381649ba359466ba5f891322
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-xenpae-20060126_2.6.16.21_0.13-3.1.i586.rpm
          cb6ef7570da4621c6db5c23bbe9e382e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/open-iscsi-0.5.545-9.13.i586.rpm
          99aa6db3390acb91b9c67ac251c2ffc3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/openafs-kmp-xenpae-1.4.0_2.6.16.21_0.13-21.1.i586.rpm
          a56246ac270979f33de6dff3aa6b9d43
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-bigsmp-0.44_2.6.16.21_0.13-15.1.i586.rpm
          afa731bcb72c96c2e3554518143a2941
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.i586.rpm
          8479ea66ef737620144bfa24d5793005
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.i586.rpm
          702881557801a075ae91c8662556181d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.i586.rpm
          fc4dfe6ba9c75dacbd9f4cf5f3b4dfbd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.i586.rpm
          82ace92edf245eceddd502b65632b4af
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-bigsmp-4.17_2.6.16.21_0.13-30.3.i586.rpm
          26815c7856a9b3e2912bba2e10baac34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-debug-4.17_2.6.16.21_0.13-30.3.i586.rpm
          be232e269a6067bd2d936f16e6c8a3a6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-default-4.17_2.6.16.21_0.13-30.3.i586.rpm
          c4c56fbf67434f5f2939dd4e85cf6108
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-smp-4.17_2.6.16.21_0.13-30.3.i586.rpm
          90fda039097bcb9dfea77c93321895e4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/udev-085-30.11.i586.rpm
          73a5ffcaeea72c89632f6597113fa435
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-bigsmp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          749b7ec34a2cd0864cd296419bdafcd8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-debug-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          a0eb6f7674520a01b151c490dc342dc7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-default-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          37a4e14ce1ec4965f26e1326d7241762
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-smp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          5c9926a62a9e5096ce63349acbe89724
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-xen-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          d2410737db46df9bada726bfc2416a2c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-xenpae-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          694c781f29dccaa1f26fcd58c79d4371
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-bigsmp-1_2.6.16.21_0.13-12.6.i586.rpm
          01f91c7bd6eb1ca1edf5bee04ea2786a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-debug-1_2.6.16.21_0.13-12.6.i586.rpm
          5a1adb87796cc4dc05dd38ff285e3408
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-default-1_2.6.16.21_0.13-12.6.i586.rpm
          38786dc33bfa6f02d3aa1bf997d25398
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-smp-1_2.6.16.21_0.13-12.6.i586.rpm
          0b4cbdb97296ee00c6a67179f4b4efb7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-xen-1_2.6.16.21_0.13-12.6.i586.rpm
          f139106bdfbc3e4faf1f4bad2a5f326b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-xenpae-1_2.6.16.21_0.13-12.6.i586.rpm
          14ed4ae45d2d65ad5c78581940bb353a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-3.0.2_09749-0.7.i586.rpm
          59d56377f67d382fa5adca980a21caa8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-devel-3.0.2_09749-0.7.i586.rpm
          2b7d4f9881b452a48abff40cf56241f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-html-3.0.2_09749-0.7.i586.rpm
          59363777b0f98db4f96722fc95752866
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-pdf-3.0.2_09749-0.7.i586.rpm
          0fa70e52865138e9644a24c036e3bda2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-ps-3.0.2_09749-0.7.i586.rpm
          ad5649957c67a8ecf5fae796fb7e40db
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-libs-3.0.2_09749-0.7.i586.rpm
          e2c1e535725b5b24cd19c51a0e8dc8f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-tools-3.0.2_09749-0.7.i586.rpm
          0cadd80f58357b3135825cba81785b56
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-tools-ioemu-3.0.2_09749-0.7.i586.rpm
          8387b6d495aa45270872f60aabc1c394
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-bigsmp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          f7b74bcb292788f9cc5c584a01a9a47b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          42a59aacc105356cfa1565cad548fd88
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          d4c16bdda9973cec6f66b6cb6216e7d1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          042d4daa42d5941ed5efce7d10c72c25
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          cd8d8148c21c5acb1739ba3467dfe119
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-xenpae-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          d4b664e27c6c8ec2eb4154d73b498171

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.6.i586.rpm
          f1a8ba80079b81685d9426f09b64bb99
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.11.i586.rpm
          d2390ddccfaad103ae4d80fb59a73800
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.11.i586.rpm
          f45d3b6f92c7e07be02ac7c45d6d2420
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.11.i586.rpm
          d5ddb4d7c4e729712abd31c16d1d00fb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.11.i586.rpm
          5354e1fa6372548bb998eacbb438fc9d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.11.i586.rpm
          f358de08699bfbd90c2a96b63d04ebe9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.11.i586.rpm
          002fde4bfccb45b7b928f2d6cb175702
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.11.i586.rpm
          8dcc7463d139b67f4058196077fd77bb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.11.i586.rpm
          82ef2c427e48d71d088bccdd3090051d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.11.i586.rpm
          4cada92e8b362a18a6cb2e7b9dad1867
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.11.i586.rpm
          a5c1fb1d7ba62cb7d47e1ebc68b6043b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.11.i586.rpm
          e2e53924d3dd90ae1ed6fd6cf65e5a98
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.11.i586.rpm
          cd9bad0b01cdad5dc70d4fbc82352af0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.11.i586.rpm
          d0af6de05ca9a572cf9ea25ba702867c

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.7.i586.rpm
          fb640315cdcf43f2ffd7f6f51828eccc
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.13.i586.rpm
          474bcbd50739da47319f62ea9efac697
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.13.i586.rpm
          f591a96ebe1788fa7503ed80b35f4b9b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.13.i586.rpm
          00c44c19362f6256a95496de93500524
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.13.i586.rpm
          cc6aebefa35a4bca90cc22cf4522fe97
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.13.i586.rpm
          00dfc63513b64f9aa6534ee0424a4d42
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.13.i586.rpm
          cfab4802ff6cdb522494690a53166bbe
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.13.i586.rpm
          a8b6221034411bf63093fa7c2b8e6ad4
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.13.i586.rpm
          267669734dc0e95e2bdf96a4c9ce5321
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.13.i586.rpm
          31d0831adab64bbf848433c2b0b68db8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.13.i586.rpm
          751dad14c0578d2522cad557ad00f13f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.13.i586.rpm
          32523934ffd726b303cd7650168262f2
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.13.i586.rpm
          5155c42795497c07f27093677b011d2c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.7.i586.rpm
          23bb3edd5eccdbfdba9abcfb1c356a7c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.7.i586.rpm
          7e0d874eacfb71671ef2cce0287f8cb0
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.13.i586.rpm
          7e561721fad94a6d744864bce5dd551e

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.16.i586.rpm
          bb0396417107d32fed4997d7a70b37f9
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.24.i586.rpm
          bde42b68a6ed0eb3c3633ceb125f348c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.24.i586.rpm
          ef4c6540b77fa646649fdc473039a569
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.24.i586.rpm
          740f4bb7cbb56cf55360bf4a1edf32fe
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.24.i586.rpm
          19313402b487108c4ef883dfcb7aa03e
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.24.i586.rpm
          4acac5fcacfb83abe2326c880a9ab94b
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.24.i586.rpm
          d5649a51a381106a7733bfe093c71bc4
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.24.i586.rpm
          0415a737781d2906b3d380ccf3946dc7
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.24.i586.rpm
          5bf912e55bb0fb5aec445eafa0075784
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.24.i586.rpm
          f56fe753c10797532e7239b9a68e97d6
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.24.i586.rpm
          a2f9dbcacff96e556ff82cc716417ed5
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.16.i586.rpm
          5a062eb816a7a4638f9261ba98767dd2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.15.i586.rpm
          9e31db031ba57f3af146a17d9597986f
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.24.i586.rpm
          0f9837aa3de9897a5983af8726615339

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.276.i586.rpm
          ceba69d6952612d1cc2434b8da1cbf75
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.276.i586.rpm
          1c1d3680df647755a922fbf8028b58b9
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.276.i586.rpm
          217d25d2d474d4f7eb974d966fd4c926
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.276.i586.rpm
          aabe3bb797ddaacc5f19b144d37b4be5
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.276.i586.rpm
          d87358add6318890f66d0de62a2bcbea
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.24.i586.rpm
          d8eadd159248361b0a9ee0e0cb3f4168

   Platform Independent:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-10-7.5.noarch.rpm
          8a183fb7f7b69af041e1f6f4a5b46d68
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-17.5.noarch.rpm
          827b675a6c216ec32902183c79433479
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2.0-34.9.noarch.rpm
          f6ae693557732b8f27eba4dfde4a9eb4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0-23.5.noarch.rpm
          acb673a77bfe60d6d036e60f5b19764b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0-27.5.noarch.rpm
          83c76ee5e56846ec7545d5fe0bf25098

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.13.noarch.rpm
          1ebb82bcf1316493ca8b4355db932d0b

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.24.noarch.rpm
          e7d6caf8cb9c23119d181b98efaf7ba7

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.276.noarch.rpm
          ece4fe625855902c637abe9f1252f6d4
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.276.noarch.rpm
          556b8059e67605daa9d789907db10778

   Power PC Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/apparmor-parser-2.0-21.5.ppc.rpm
          f630cd2887055b6442706a229bd79f34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-1.1.3-23.3.ppc.rpm
          8aa6cc2de24e4bb4d4c74307986ca354
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-devel-1.1.3-23.3.ppc.rpm
          f7e3b65e5754df2c7e3f81387f4dfce5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-libs-1.1.3-23.3.ppc.rpm
          5c6861388a938b80c266a1932fac85d0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          ac3295455812a021ad5f239ab56287cb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-iseries64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          8dd405813e14d317831dc5b6a657d55d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-ppc64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          c59982049da9a11ebf26e3ac477442ab
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-0.7.18-3.3.ppc.rpm
          fdcc271b40cfc14985951fb94154c0ef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          16e8bf1e04d4574ea116fd8a9617c5ed
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-iseries64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          0e648065b5442763404396603e1c2782
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-ppc64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          a7dcee57666e9ca61d4dea5b4953655b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-default-2.6.16.21-0.13.ppc.rpm
          e37ef749e89e0785dee5cb0bb1efa740
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-iseries64-2.6.16.21-0.13.ppc.rpm
          1623a8a97419a2272027aa166430860a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-kdump-2.6.16.21-0.13.ppc.rpm
          76c9fdf080d3697ba2b97a18b3c031f8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-ppc64-2.6.16.21-0.13.ppc.rpm
          181a7668969c02dd217f77f795f88214
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-source-2.6.16.21-0.13.ppc.rpm
          216d42cb7f22a423bb62b1af3124ca5a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-syms-2.6.16.21-0.13.ppc.rpm
          2442412bc80a1301b3cf4a8e491e1a1d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          583928fdc71ae4a8790bc1d04be092d0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-iseries64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          0c617c35763488383d31e09776981ffc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-ppc64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          b64cd82811dc7d7f279b87e5dbc51276
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/mkinitrd-1.2-106.15.ppc.rpm
          70ca7ada636755d8ba1d159d38cfb98c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/multipath-tools-0.4.6-25.9.ppc.rpm
          0df9787c0d34cdde227e76218accbafb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/open-iscsi-0.5.545-9.13.ppc.rpm
          8b19b4b4d10841fc0edcfad8bead5321
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.ppc.rpm
          108d8f2c2b660bfd805ef76820a8a835
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcfclock-kmp-ppc64-0.44_2.6.16.21_0.13-15.1.ppc.rpm
          0dab492bad5d5815c678df2987ebae62
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.ppc.rpm
          61cd65508674e71fe619bec2fb9026f3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/udev-085-30.11.ppc.rpm
          4571532a54b7e221448b324ca994e4d1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-default-1_2.6.16.21_0.13-12.6.ppc.rpm
          079bb0db9f9396f5daf64cb00246bbd1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-iseries64-1_2.6.16.21_0.13-12.6.ppc.rpm
          835067ccf55f42ed34cff08e9b6ffce4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-ppc64-1_2.6.16.21_0.13-12.6.ppc.rpm
          3bd1bb0e1150dc95f94858e956f4dc22
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.ppc.rpm
          068e5337926200f980be3dcb67c2eb98

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.11.ppc.rpm
          8351be43b5c3896df83c63ba65cfeb5a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.11.ppc.rpm
          7747fa43d835b3320b3a3fa54f235013
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.11.ppc.rpm
          18c443c60f7829c88bd821fb865046ac
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.11.ppc.rpm
          06cf812b56183eb5156e344db7fe310c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.11.ppc.rpm
          2f44c721c158dd9f56a497223b54431d

   x86-64 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/apparmor-parser-2.0-21.5.x86_64.rpm
          060873e93856d7954d33812f2cb26c13
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-1.1.3-23.3.x86_64.rpm
          a3149bc43d13af6a808efce907f11b53
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-devel-1.1.3-23.3.x86_64.rpm
          48d28c73627c036e60fbcba5daa889ff
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-libs-1.1.3-23.3.x86_64.rpm
          dee93d43a783ebf6ca16202a1382118f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          dc2bb193b8f30b6d3444aa9371826d23
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          df81804f31015ce6baf0eec3354a75b9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          a9f20351762bccc74ebc1df2d5b5adf4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          1013121fc139ace267bb33f3b10e114d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-0.7.18-3.3.x86_64.rpm
          44025e09c1571e735f82d4d60e71fc0b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          3331bff87496d9e9afa1fb83919b1111
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          2b85c2e78d4ecb2e0e21f7908c7257f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          bd3e07b7356c64b541be792c97868d19
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          35ee253010ade83dc595c8a27f308335
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          d845a7df15fdb571df85b31e6a667005
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          a3f8918d10b82a61042f3044a695e877
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          82f20f84b58d676999e5e909336c66b7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          c5584a0cbbc8d0fef477afe195dcf277
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          fe4d8f6e1297c41dd04b1dc6473d47c1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          1a03723657be633a35162e31940ae647
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          66875b4b65f2e48df27491a2d0d93de9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          0e8f15d78033b73a96440736820e5cbb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-debug-2.6.16.21-0.13.x86_64.rpm
          d237873002ea1a5501f3b61f76b6903c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-default-2.6.16.21-0.13.x86_64.rpm
          f44e5a424121b256b3c1287997ba4061
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-kdump-2.6.16.21-0.13.x86_64.rpm
          170baeb8f839651598ddbcbf93aa4670
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-smp-2.6.16.21-0.13.x86_64.rpm
          d32a01850aebf660e1a740c2f9b9927a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-source-2.6.16.21-0.13.x86_64.rpm
          8002fc7b644f2c64c258400f29050e5d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-syms-2.6.16.21-0.13.x86_64.rpm
          9c7549f01707a434c0247f73eb9b0152
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-xen-2.6.16.21-0.13.x86_64.rpm
          9ecef38e308f2e4ef644e832fee15a8b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kexec-tools-1.101-32.17.x86_64.rpm
          121b57cabdcb74e90f3992ad2a7843c8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
          84ef08317d3bcf6552ec57a0487349e0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
          64898d1f8f8e98ab43f2d52a10bd3a52
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/mkinitrd-1.2-106.15.x86_64.rpm
          49bee58e184fe82330f0b9c1720a97f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/multipath-tools-0.4.6-25.9.x86_64.rpm
          e01336dc8e630ffa76918c4e487dba9f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          fe54b39f60d50c48f25d9e756212991e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          2906ea2b8c781eda354a83bcd668ea10
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          16ee21b17dcd1e5c3db212d9b9f281ba
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          59f733077e5cf2d208802599111778b1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          6bce5050ab3d11597c129b2a86a22599
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          b033fe6ec282491fc8227718a2ccddb3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          e0a234ff6261e1b3d28afcfb1b09cb52
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          e262ada6e83e80b394f84deb18d367c7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          1ba9eece36909166f129f3a05c5b0a34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          0c61295b0a053475f6a31619f761d67d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          28c2c42e81b473b533800c26fb161db8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          b490a216fad445f0499dabb64307de75
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          f72df7eddb5a3f417878e5680fab5cd1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/open-iscsi-0.5.545-9.13.x86_64.rpm
          c51104356caeb53cd189079bfc8f7bb4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          5487af5844e98b6a3d51394671d19fd5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          5547a66c2172a1e37cf83352a2971bf7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          fbd677b5ef2747de9f038efb55ff5162
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.x86_64.rpm
          01f40956b13ece3ffac89484d99784f1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/udev-085-30.11.x86_64.rpm
          149b04dbd960e9c853578c5357ce142d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-debug-1_2.6.16.21_0.13-12.6.x86_64.rpm
          3356f6a1d58c98344b354fc556a7ed32
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-default-1_2.6.16.21_0.13-12.6.x86_64.rpm
          3fcf84553e3039c1ad1659681fa59c4f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-smp-1_2.6.16.21_0.13-12.6.x86_64.rpm
          c9c8d7587bd5922fb0d87d066f402d72
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-xen-1_2.6.16.21_0.13-12.6.x86_64.rpm
          dffd5eab1d7e201b8802b96bd5b39030
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-3.0.2_09749-0.7.x86_64.rpm
          8f08be21026a337d1331288d0ed33192
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-devel-3.0.2_09749-0.7.x86_64.rpm
          9e9806f40e6ab9961543306d1ee236cf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-html-3.0.2_09749-0.7.x86_64.rpm
          7ef2bf1b781916f5a778804380ad921b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-pdf-3.0.2_09749-0.7.x86_64.rpm
          04e9674d20bbbf8785b5cfcc2131e7da
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-ps-3.0.2_09749-0.7.x86_64.rpm
          a0b1277b24d9c2c0a46557bb6f4e4473
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-libs-3.0.2_09749-0.7.x86_64.rpm
          b5eb3c8eb334d8f09bce0ec67d9e9ca7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-libs-32bit-3.0.2_09749-0.7.x86_64.rpm
          9955c0c24e174ec83f46ce52e76ab98e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-tools-3.0.2_09749-0.7.x86_64.rpm
          523ccc5bee4cfdbb9b1b7080f9a05649
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-tools-ioemu-3.0.2_09749-0.7.x86_64.rpm
          08159c0dd7ea459396d5de547e75d7f0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          b2499ba0ba2367da270f690b75ee40c8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          45d781cffb80f6d8bd5d58be522aa2f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          7ad169812c058a21be7b49fd86fd9237
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          f9c0361874d265be3e6e2e8ef66ae635

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.11.x86_64.rpm
          b85489f0ad8cc9bbb5728c64e7c8fc2f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.11.x86_64.rpm
          4e132e7adbada352e112c64a3c9f2408
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.11.x86_64.rpm
          087fea22e9d90ef98337c30f55318db3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.11.x86_64.rpm
          e6f47d4bd1fda55cabf5a59b62c2e183
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.11.x86_64.rpm
          0a6f8350214710e2f600ac204eb1a0a5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.11.x86_64.rpm
          5fff86f3834368fa34c5e32855f44d0c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.11.x86_64.rpm
          f87081d87e0f9c7d3ba627309107bddf
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.11.x86_64.rpm
          b8d9b58c238d533550ccce278dad30f0

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.13.x86_64.rpm
          43f6fb67727c88b0f4aeda733120ac84
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.13.x86_64.rpm
          bf333ee5088cc7f5a4888530557fb719
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.13.x86_64.rpm
          be4142bb00d29a20b18159add573fc74
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.13.x86_64.rpm
          8c47ed2a4949b3e9aaa046830472b2ef
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.13.x86_64.rpm
          1d373c25c0590d223f17e1d9feba1f6c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.13.x86_64.rpm
          f21817e9293fc603914958b0eed983ca

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.24.x86_64.rpm
          c4d600c67fa16520e30e4f306c2f174c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.24.x86_64.rpm
          1e5a69fdd455ba1c9317b5386b4f887d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.24.x86_64.rpm
          37a138694706fdd8229d51f75256ca74
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.24.x86_64.rpm
          9ede22ac6b4119995d4c8ea6329f2851
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.24.x86_64.rpm
          9c28c19a989ad975e26c3c4210ab93df
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.24.x86_64.rpm
          ef6477f4e8d9386e8c14e5f33cab6e15

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.276.x86_64.rpm
          a1ec9ed29e7b844639fb264c0c051f79
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.276.x86_64.rpm
          9c18e347968bc60d4e32b67557c1830b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.276.x86_64.rpm
          205bd72a791fd24589330c152f73d18b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.276.x86_64.rpm
          63ada2081021bc1307c6153ccd043b87

   Sources:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-admin_en-10-7.5.src.rpm
          43095bf3f55a08d8064a021d6aaa1db7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-docs-2.0-17.5.src.rpm
          abe9f0dc42be1ce5c7590f357d9d134b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-parser-2.0-21.5.src.rpm
          7fe00c347fec96fef49bf0463b209210
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-profiles-2.0-34.9.src.rpm
          c6b49655962246afcc288c2df8eed31f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-utils-2.0-23.5.src.rpm
          5257e473bc5e8a6f7c4dccd5e6a9ae55
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/audit-1.1.3-23.3.src.rpm
          cf3d5c02a37d737c0178c72ea84ee203
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/drbd-0.7.18-3.3.src.rpm
          f7c33143e57fb99cf0b392096d9f7d44
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-bigsmp-2.6.16.21-0.13.nosrc.rpm
          9359a72d2f9016a61beb36f6b2f0fa28
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-debug-2.6.16.21-0.13.nosrc.rpm
          4a26cacb10c6dbf2706fadc4b83535e4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-default-2.6.16.21-0.13.nosrc.rpm
          235efd96d5f7c6ccfc9a398cc8d27108
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-iseries64-2.6.16.21-0.13.nosrc.rpm
          40dc372c825056205aa0c1cc1de2473b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-kdump-2.6.16.21-0.13.nosrc.rpm
          ed77128c1b3433a22c12cb78491d9353
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-ppc64-2.6.16.21-0.13.nosrc.rpm
          d322ff866d8534ad3bc53e6dabc3443d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-smp-2.6.16.21-0.13.nosrc.rpm
          a4aeb424592289ef78edcdd6cd1449db
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-source-2.6.16.21-0.13.src.rpm
          9173110fbf71bfb007b9a560e3a9bad6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-syms-2.6.16.21-0.13.src.rpm
          02cdf335631f2da95056cba8eda0f165
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-um-2.6.16.21-0.13.nosrc.rpm
          1324aec2bfd8c3530e8f90088cc25c81
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xen-2.6.16.21-0.13.nosrc.rpm
          1250728306b9b3253ae82afedf0f1e4a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xenpae-2.6.16.21-0.13.nosrc.rpm
          f193f3d82e8b0aa15d7ab13a081a7cf2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kexec-tools-1.101-32.17.src.rpm
          3374197c18ba7324995f433a939fbe54
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/mkinitrd-1.2-106.15.src.rpm
          ddf61f16d38e997d85fd04fdf64eaa02
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/multipath-tools-0.4.6-25.9.src.rpm
          261e2516378e1e6596f9ad767a0594bc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/open-iscsi-0.5.545-9.13.src.rpm
          852e15549b54733414a667631052840b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/udev-085-30.11.src.rpm
          330f5f4e04d9448b023301d3ff332305
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/xen-3.0.2_09749-0.7.src.rpm
          9adfc5f7c109b6c7f206d2765b99f1ec
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/yast2-apparmor-2.0-27.5.src.rpm
          279b8397e1cd4fd829b12f09018f46cc

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.6.src.rpm
          4b3fb42d44b1cf10ab6d4ede6bb67fa0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.11.nosrc.rpm
          e05d21d1ad9f1c3ea3268dde157fe13b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.11.nosrc.rpm
          f10fad044c2193fa6261096b223db611
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.11.nosrc.rpm
          3190b4017784a56bb412971d6ed06a1f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.11.nosrc.rpm
          bcfbd7b1edbc5a97d9fda3f540d0be9d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.11.nosrc.rpm
          b590965d0190dfe933b8e3572a190706
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.11.nosrc.rpm
          00a4a6bcab31204089ec8464b070ecf9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.11.src.rpm
          790f0f0352d0f3cceb730a4e06f1951f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.11.src.rpm
          0c017619952331561adfbed8399d7aff
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.11.nosrc.rpm
          c2ed71e73606a5330f55870b8f1d7d38
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.11.nosrc.rpm
          9fcc6eb7846ddd324f4c88a9f1a99eea

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.7.src.rpm
          e84f71edcbbad93da19fca50936e457f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.13.nosrc.rpm
          c2d704c30248e369c1256c9cbda9c792
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.13.nosrc.rpm
          a83446d1d83069403cf167da49f7e4ac
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.13.src.rpm
          515752e1ce2951bf3338664c6db1e93f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.13.nosrc.rpm
          2227766974f9d279173ff67adac2846a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.13.src.rpm
          a7eb9d1dde2fbf036057c3eea7da228f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.13.src.rpm
          bd62cf4acca249292569a439d1b95a08
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.13.nosrc.rpm
          7f5d2e691cf0e2373b85895e7518a1ff
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.13.nosrc.rpm
          f637f470f98d0c2ed239dae6d57461b8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.7.src.rpm
          a070d16b8d8f48d7df10f4a2a7553746
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.7.src.rpm
          a4df9d5558c21e322565bb837443b249

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.16.src.rpm
          df33c271d1a488f4b546947c9100e856
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.24.nosrc.rpm
          4baaed24bac712a743c68e6da5328bbd
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.24.nosrc.rpm
          a12e6479c058a95c5c057359df1f87ac
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.24.src.rpm
          d49b746c707e82b7552e09ca752b012c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.24.nosrc.rpm
          2e4370a418fb2cd663e19f1b5722e8d2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.24.src.rpm
          ddb880da28744d6906698a6d71772b9a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.24.src.rpm
          be826c69b6a717786bc4a42d4558d666
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.24.nosrc.rpm
          73f298756b8c260db19f66045702de42
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.16.src.rpm
          929a46b7e2e7045c182909134c90f764
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.15.src.rpm
          933712007872a733e4f8f2f7a2d6040f

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.276.nosrc.rpm
          86501653c20812d977ea23f47af5c9d3
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.276.nosrc.rpm
          6fc2656d5c81821db987ccfa26ad51ea
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.276.src.rpm
          8541534925706aa2063d874f14a365a6
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.276.nosrc.rpm
          c9a6e3ee6a98005ecd4710a8b0bc8c4e
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.276.src.rpm
          523fd5b4a12c8c666818ea94e9e699e3
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.276.src.rpm
          660abce3f8e14427bbaf17e3fa01d115
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.24.src.rpm
          d259fef3b0115765990fb4e58cee0e40
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.276.nosrc.rpm
          77411e0e5b44ae7ca78bc0e9ed77e646
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.276.src.rpm
          da439bf54800360273231d0a62e00f72
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.276.nosrc.rpm
          862a7fafdee7df50a02aceac09f86017
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.276.src.rpm
          61a48f3900f2c1d2fd389dff0566225d
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.276.src.rpm
          cd0906f0fc78df823b65df1b6de63944

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@suse.de>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

       to verify the signature of the package, replacing <file.rpm> with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum <filename.rpm>

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (FAQ),
    send mail to <suse-security-info@suse.com> or
    <suse-security-faq@suse.com>.

    =====================================================================
    SUSE's security contact is <security@suse.com> or <security@suse.de>.
    The <security@suse.de> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID     Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRMd4lXey5gA9JdPZAQI79gf/R9BbReJKlkRL8YMn8TOrWJXc4sJ1M2xA
SGQV4vq7cuhYPoyiW9TANnRn/w57iBIrwZWUtg4atSENOhjaZrjm8nwiHoSp1xZn
u+iM57hbt38CiPt06CzLf0DrC9vKh7znHhTOXh0/8QeQA+gGF0g1z+LHcmxECkom
JFcZ82lz7jKknTycH8ySo09o25eGUrfhzmpzPb8JLglUUpZ4tXaWN+OJG0c7RiWl
fN8xyq9zyVjxK4uLHwWtIjAUvT3mriJdJU7Snr+11H/mkJEq3Of8LobMFKVVKPTQ
7YweB4E0KwsMBIJpweeT6x+nXEupxtAlKkhBlZpX/9vgmdUjdjZa0w==
=qXhX
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F48101)

rPSA-2006-0122-1.txt (PacketStormID:F48101)
2006-07-09 00:00:00
 
advisory,kernel,vulnerability
linux
CVE-2006-2451,CVE-2006-2934
[点击下载]

rPath Security Advisory: 2006-0122-1 - Multiple kernel vulnerabilities have been address in rPath Linux.

rPath Security Advisory: 2006-0122-1
Published: 2006-07-07
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    Local Deterministic Denial of Service
Updated Versions:
    kernel=/conary.rpath.com@rpl:devel//1/2.6.16.24-0.1-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
    https://issues.rpath.com/browse/RPL-488

Description:
    Previous versions of the kernel package are vulnerable to two denial
    of service attacks.  The first allows any local user to fill up file
    systems by causing core dumps to write to directories to which they
    do not have write access permissions.  The second applies only to
    systems using the SCTP protocol, which is not enabled by default,
    and the tools required to configure it (lksctp-tools) are not included
    in rPath Linux.  This vulnerability, which cannot apply to systems
    without lksctp-tools installed, enables a remote denial of service
    attack in which specially-crafted packets can crash the system.
    

- 漏洞信息 (F48096)

Trustix Secure Linux Security Advisory 2006.40 (PacketStormID:F48096)
2006-07-09 00:00:00
Trustix  http.trustix.org
advisory,remote,denial of service
linux
CVE-2006-2934
[点击下载]

Trustix Secure Linux Security Advisory #2006-0040: SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0040

Package names:	   kernel
Summary:           Multiple vulnerabilities
Date:              2006-07-07
Affected versions: Trustix Secure Linux 3.0

- --------------------------------------------------------------------------
Package description:
  kernel
  The kernel package contains the Linux kernel (vmlinuz), the core of
  your Trustix Secure Linux operating system. The kernel handles the 
  basic functions of the operating system: memory allocation, process 
  allocation, device input and output, etc.

Problem description:
  kernel < TSL 3.0 >
  - New upstream.
  - SECURITY FIX: SCTP conntrack (ip_conntrack_proto_sctp.c) in
    netfilter allows remote attackers to cause a denial of service
    (crash) via a packet without any chunks, which causes a variable
    to contain an invalid value that is later used to dereference a
    pointer.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2006-2934 to this issue.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0040/>


MD5sums of the packages:
- --------------------------------------------------------------------------
ca9e4c250323d1daf972457c0a207db7  3.0/rpms/kernel-2.6.17.3-1tr.i586.rpm
dcc2f068e20b38fa4755c038c8b386c7  3.0/rpms/kernel-doc-2.6.17.3-1tr.i586.rpm
641514c3081e4411da0b4971d430e01d  3.0/rpms/kernel-headers-2.6.17.3-1tr.i586.rpm
1efb4a2e2dd1826f411fbc75230af4f2  3.0/rpms/kernel-smp-2.6.17.3-1tr.i586.rpm
a3938388854868901d3459e102439990  3.0/rpms/kernel-smp-headers-2.6.17.3-1tr.i586.rpm
c73df63969c9a5cd86fc7c56b5cc2a6c  3.0/rpms/kernel-source-2.6.17.3-1tr.i586.rpm
47765e9b72a8bda650fe78ea3b432fdd  3.0/rpms/kernel-utils-2.6.17.3-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFErjw5i8CEzsK9IksRAi/IAJ4o38F+8GxIbEDL2UUEtyZqwFXj+ACdEGgt
u2QOhOpsqmO4QATnNleAtyU=
=AcCl
-----END PGP SIGNATURE-----
    

- 漏洞信息

26963
Linux Kernel SCTP conntrack Chunkless Packet Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown Vendor Verified

- 漏洞描述

Linux Kernel contains a flaw that may allow a remote denial of service. The issue is triggered when an error occurs when handling SCTP packets without a chunk, and will result in loss of availability for the platform.

- 时间线

2006-06-30 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.6.16.23, 2.6.17.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Linux Kernel Netfilter Conntrack_Proto_SCTP.C Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 18755
Yes No
2006-06-30 12:00:00 2006-11-13 07:06:00
George A. Theall is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 sparc
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS sparc
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server 9
rPath rPath Linux 1
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Linux kernel 2.6.17 .1
Linux kernel 2.6.17 -rc5
Linux kernel 2.6.17
Linux kernel 2.6.16 13
Linux kernel 2.6.16 .9
Linux kernel 2.6.16 .8
Linux kernel 2.6.16 .7
Linux kernel 2.6.16 .5
Linux kernel 2.6.16 .4
Linux kernel 2.6.16 .3
Linux kernel 2.6.16 .21
Linux kernel 2.6.16 .2
Linux kernel 2.6.16 .19
Linux kernel 2.6.16 .18
Linux kernel 2.6.16 .17
Linux kernel 2.6.16 .16
Linux kernel 2.6.16 .12
Linux kernel 2.6.16 .11
Linux kernel 2.6.16 .1
Linux kernel 2.6.16 -rc1
Linux kernel 2.6.16
Linux kernel 2.6.15 .6
Linux kernel 2.6.15 .4
Linux kernel 2.6.15 .3
Linux kernel 2.6.15 .2
Linux kernel 2.6.15 .1
Linux kernel 2.6.15 -rc6
Linux kernel 2.6.15 -rc5
Linux kernel 2.6.15 -rc4
Linux kernel 2.6.15 -rc3
Linux kernel 2.6.15 -rc2
Linux kernel 2.6.15 -rc1
Linux kernel 2.6.15
Linux kernel 2.6.14 .5
Linux kernel 2.6.14 .4
Linux kernel 2.6.14 .3
Linux kernel 2.6.14 .2
Linux kernel 2.6.14 .1
Linux kernel 2.6.14 -rc4
Linux kernel 2.6.14 -rc3
Linux kernel 2.6.14 -rc2
Linux kernel 2.6.14 -rc1
Linux kernel 2.6.14
Linux kernel 2.6.13 .4
Linux kernel 2.6.13 .3
Linux kernel 2.6.13 .2
Linux kernel 2.6.13 .1
Linux kernel 2.6.13 -rc7
Linux kernel 2.6.13 -rc6
Linux kernel 2.6.13 -rc4
Linux kernel 2.6.13 -rc1
Linux kernel 2.6.13
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.12
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.6.15.5
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8710 CM 3.1
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8700 CM 3.1
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8500 CM 3.1
Avaya S8500 0
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya S8300 CM 3.1
Avaya S8300 0
Avaya Messaging Storage Server MM3.0
Avaya Converged Communications Server 2.0
Linux kernel 2.6.17 .3
Linux kernel 2.6.16 .23

- 不受影响的程序版本

Linux kernel 2.6.17 .3
Linux kernel 2.6.16 .23

- 漏洞讨论

The Linux kernel 'netfilter' module is prone to a denial-of-service vulnerability.

Successful exploits of this vulnerability will cause the kernel to crash, effectively denying service to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

The vendor has released kernel versions 2.6.16.23 and 2.6.17.3 to address this issue.

See the referenced advisories for more information.


S.u.S.E. Linux Professional 10.1

Linux kernel 2.6.15

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站