CVE-2006-3626
CVSS6.2
发布时间 :2006-07-18 11:46:00
修订时间 :2011-03-07 21:39:07
NMCOPS    

[原文]Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.


[CNNVD]Linux Kernel PROC文件系统本地权限提升漏洞(CNNVD-200607-276)

        Linux Kernel是开发源码操作系统Linux所使用的内核。
        Linux Kernel的proc文件系统中存在竞争条件错误,本地攻击者可能利用此漏洞获取root用户权限。
        这是一个0day攻击,目前正在被积极的利用。

- CVSS (基础分值)

CVSS分值: 6.2 [中等(MEDIUM)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:linux:linux_kernel:2.6.16.18Linux Kernel 2.6.16.18
cpe:/o:linux:linux_kernel:2.6.16.4Linux Kernel 2.6.16.4
cpe:/o:linux:linux_kernel:2.6.16.19Linux Kernel 2.6.16.19
cpe:/o:linux:linux_kernel:2.6.17:rc3Linux Kernel 2.6.17 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.16.5Linux Kernel 2.6.16.5
cpe:/o:linux:linux_kernel:2.6.16:rc3Linux Kernel 2.6.16 Release Candidate 3
cpe:/o:linux:linux_kernel:2.6.16.13Linux Kernel 2.6.16.13
cpe:/o:linux:linux_kernel:2.6.16.23Linux Kernel 2.6.16.23
cpe:/o:linux:linux_kernel:2.6.16.14Linux Kernel 2.6.16.14
cpe:/o:linux:linux_kernel:2.6.16.24Linux Kernel 2.6.16.24
cpe:/o:linux:linux_kernel:2.6.17:rc4Linux Kernel 2.6.17 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.16.2Linux Kernel 2.6.16.2
cpe:/o:linux:linux_kernel:2.6.16.15Linux Kernel 2.6.16.15
cpe:/o:linux:linux_kernel:2.6.16.10Linux Kernel 2.6.16.10
cpe:/o:linux:linux_kernel:2.6.17:rc2Linux Kernel 2.6.17 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.16:rc2Linux Kernel 2.6.16 Release Candidate 2
cpe:/o:linux:linux_kernel:2.6.16.7Linux Kernel 2.6.16.7
cpe:/o:linux:linux_kernel:2.6.16:rc1Linux Kernel 2.6.16 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.16.8Linux Kernel 2.6.16.8
cpe:/o:linux:linux_kernel:2.6.17Linux Kernel 2.6.17
cpe:/o:linux:linux_kernel:2.6.17.2Linux Kernel 2.6.17.2
cpe:/o:linux:linux_kernel:2.6.16Linux Kernel 2.6.16
cpe:/o:linux:linux_kernel:2.6.16.3Linux Kernel 2.6.16.3
cpe:/o:linux:linux_kernel:2.6.16:rc5Linux Kernel 2.6.16 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.16.11Linux Kernel 2.6.16.11
cpe:/o:linux:linux_kernel:2.6.16.22Linux Kernel 2.6.16.22
cpe:/o:linux:linux_kernel:2.6.16.12Linux Kernel 2.6.16.12
cpe:/o:linux:linux_kernel:2.6.17:rc1Linux Kernel 2.6.17 Release Candidate 1
cpe:/o:linux:linux_kernel:2.6.16.20Linux Kernel 2.6.16.20
cpe:/o:linux:linux_kernel:2.6.17.4Linux Kernel 2.6.17.4
cpe:/o:linux:linux_kernel:2.6.17.1Linux Kernel 2.6.17.1
cpe:/o:linux:linux_kernel:2.6.16:rc6Linux Kernel 2.6.16 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.17:rc6Linux Kernel 2.6.17 Release Candidate 6
cpe:/o:linux:linux_kernel:2.6.16.6Linux Kernel 2.6.16.6
cpe:/o:linux:linux_kernel:2.6.17.3Linux Kernel 2.6.17.3
cpe:/o:linux:linux_kernel:2.6.16.17Linux Kernel 2.6.16.17
cpe:/o:linux:linux_kernel:2.6.16.16Linux Kernel 2.6.16.16
cpe:/o:linux:linux_kernel:2.6.16.1Linux Kernel 2.6.16.1
cpe:/o:linux:linux_kernel:2.6.16:rc4Linux Kernel 2.6.16 Release Candidate 4
cpe:/o:linux:linux_kernel:2.6.16.21Linux Kernel 2.6.16.21
cpe:/o:linux:linux_kernel:2.6.17:rc5Linux Kernel 2.6.17 Release Candidate 5
cpe:/o:linux:linux_kernel:2.6.16.9Linux Kernel 2.6.16.9

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10060Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3626
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-276
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/2816
(UNKNOWN)  VUPEN  ADV-2006-2816
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html
(UNKNOWN)  FULLDISC  20060714 Linux kernel 0day - dynamite inside, don't burn your fingers
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=198973
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=198973
http://xforce.iss.net/xforce/xfdb/27790
(UNKNOWN)  XF  linux-proc-race-condition(27790)
http://www.ubuntulinux.org/support/documentation/usn/usn-319-1
(UNKNOWN)  UBUNTU  USN-319-1
http://www.ubuntu.com/usn/usn-319-2
(UNKNOWN)  UBUNTU  USN-319-2
http://www.securityfocus.com/bid/18992
(UNKNOWN)  BID  18992
http://www.securityfocus.com/archive/1/archive/1/440300/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060717 rPSA-2006-0130-1 kernel
http://www.redhat.com/support/errata/RHSA-2006-0617.html
(UNKNOWN)  REDHAT  RHSA-2006:0617
http://www.osvdb.org/27120
(UNKNOWN)  OSVDB  27120
http://www.novell.com/linux/security/advisories/2006_49_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:049
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:047
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
(UNKNOWN)  SUSE  SUSE-SA:2006:042
http://www.novell.com/linux/security/advisories/2006_17_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2006:017
http://www.mandriva.com/security/advisories?name=MDKSA-2006:124
(UNKNOWN)  MANDRIVA  MDKSA-2006:124
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0cb8f20d000c25118947fcafa81606300ced35f8;hp=243a94af0427b2630fb85f489a5419410dac3bfc;hb=18b0bbd8ca6d3cb90425aa0d77b99a762c6d6de3;f=fs/proc/base.c
(UNKNOWN)  CONFIRM  http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0cb8f20d000c25118947fcafa81606300ced35f8;hp=243a94af0427b2630fb85f489a5419410dac3bfc;hb=18b0bbd8ca6d3cb90425aa0d77b99a762c6d6de3;f=fs/proc/base.c
http://www.debian.org/security/2006/dsa-1111
(UNKNOWN)  DEBIAN  DSA-1111
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
http://secunia.com/advisories/22174
(UNKNOWN)  SECUNIA  22174
http://secunia.com/advisories/21605
(UNKNOWN)  SECUNIA  21605
http://secunia.com/advisories/21498
(UNKNOWN)  SECUNIA  21498
http://secunia.com/advisories/21179
(UNKNOWN)  SECUNIA  21179
http://secunia.com/advisories/21123
(UNKNOWN)  SECUNIA  21123
http://secunia.com/advisories/21119
(UNKNOWN)  SECUNIA  21119
http://secunia.com/advisories/21073
(UNKNOWN)  SECUNIA  21073
http://secunia.com/advisories/21057
(UNKNOWN)  SECUNIA  21057
http://secunia.com/advisories/21041
(UNKNOWN)  SECUNIA  21041
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.5
(UNKNOWN)  CONFIRM  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.5

- 漏洞信息

Linux Kernel PROC文件系统本地权限提升漏洞
中危 竞争条件
2006-07-18 00:00:00 2006-07-20 00:00:00
本地  
        Linux Kernel是开发源码操作系统Linux所使用的内核。
        Linux Kernel的proc文件系统中存在竞争条件错误,本地攻击者可能利用此漏洞获取root用户权限。
        这是一个0day攻击,目前正在被积极的利用。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.17.5.tar.bz2

- 漏洞信息 (F48636)

SUSE-SA-2006-042.txt (PacketStormID:F48636)
2006-07-28 00:00:00
 
advisory,kernel,vulnerability
linux,suse
CVE-2006-0744,CVE-2006-1528,CVE-2006-1855,CVE-2006-1857,CVE-2006-1858,CVE-2006-1859,CVE-2006-1860,CVE-2006-2444,CVE-2006-2445,CVE-2006-2448,CVE-2006-2450,CVE-2006-2451,CVE-2006-2934,CVE-2006-2935,CVE-2006-3085,CVE-2006-3626
[点击下载]

SUSE Security Announcement SUSE-SA:2006:042 - A slew of kernel related vulnerabilities has been fixed in SUSE Linux for the 2.6 series.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:042
        Date:                   Wed, 26 Jul 2006 14:00:00 +0000
        Affected Products:      SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
        Vulnerability Type:     local privilege escalation
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2006-0744, CVE-2006-1528, CVE-2006-1855
                                CVE-2006-1857, CVE-2006-1858, CVE-2006-1859
                                CVE-2006-1860, CVE-2006-2444, CVE-2006-2445
                                CVE-2006-2448, CVE-2006-2450, CVE-2006-2451
                                CVE-2006-2934, CVE-2006-2935, CVE-2006-3085
                                CVE-2006-3626

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             Various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The Linux kernel has been updated to fix several security issues.

   This advisory refers to kernel updates for SUSE Linux 9.1 - 10.1.

   For the SUSE Linux Enterprise 9 and 10, Novell Linux Desktop 9, Open
   Enterprise Server products the kernel update is still in testing and
   will be released within the next week.

   SUSE Linux Enterprise 8 and SUSE Linux Desktop 1 with Linux 2.4 based
   kernels are not affected by exploitable problems in their default
   configuration and will not be updated with this security update round.

   The SUSE Linux 10.1 kernel has been updated to state of the SUSE
   Linux Enterprise 10 kernel and will continue to track it.
   The updated kernel enables convenient use of kernel module packages
   for NVIDIA and ATI drivers on SUSE Linux 10.1.
   Please see the HOWTOs on http://opensuse.org/ on how to add and use
   them. The update also includes a set of AppArmor and Kernel Module
   Package (KMP) updates.

   Following security issues fixed:
   - CVE-2006-0744: When the user could have changed %RIP always force IRET,
                    now also fixed for the UML kernel.

   - CVE-2006-1859: A memory leak in __setlease in fs/locks.c allows
                    local attackers to cause a denial of service (memory
                    consumption) via unspecified actions related to an
                    "uninitialized return value," aka "slab leak."

   - CVE-2006-1860: lease_init in fs/locks.c allows local attackers to cause a
                    denial of service (fcntl_setlease lockup) via actions
                    that cause lease_init to free a lock that might not
                    have been allocated on the stack.

   - CVE-2006-1528: Linux allows local users to cause a denial of service (crash)
                    via a Direct I/O transfer from the sg driver to memory
                    mapped (mmap) IO space.

   - CVE-2006-1855: It was possible to potentially crash the kernel by
                    using CPU timers and timing the termination of the
                    parent process.

   - CVE-2006-1857: A buffer overflow in the SCTP protocol could allow remote
                    attackers to cause a crash or possibly execute arbitrary
                    code via a malformed HB-ACK chunk.

   - CVE-2006-1858: SCTP allowed remote attackers to cause a denial of service
                    (crash) and possibly execute arbitrary code via a chunk
                    length that is inconsistent with the actual length of
                    provided parameters.

   - CVE-2006-2444: The snmp_trap_decode function in the SNMP NAT helper
                    allows remote attackers to cause a denial of service
                    (crash) via unspecified remote attack vectors that cause
                    failures in snmp_trap_decode that trigger (1) frees of
                    random memory or (2) frees of previously-freed memory
                    (double-free) by snmp_trap_decode as well as its calling
                    function, as demonstrated via certain test cases of
                    the PROTOS SNMP test suite.

   - CVE-2006-2445: A race condition in run_posix_cpu_timers allows local
                    users to cause a denial of service (BUG_ON crash)
                    by causing one CPU to attach a timer to a process that
                    is exiting.

   - CVE-2006-2448: Due to missing checking of validity of user space pointers
                    it was possible for local attackers to read any kernel
                    memory, potentially exposing sensitive data to the
                    attacker or crash the kernel.
                    This problem is PowerPC specific.

   - CVE-2006-3085: Fixed a remotely trigger able endless loop in SCTP netfilter
                    handling caused by 0 chunk length.

   - CVE-2006-2451: Due to an argument validation error in prctl(PR_SET_DUMPABLE)
                    a local attacker can easily gain administrator (root)
                    privileges.

   - CVE-2006-2934: When a SCTP packet without any chunks is received, the
                    newconntrack variable in sctp_packet contains an out of
                    bounds value that is used to look up an pointer from the
                    array of timeouts, which is then dereferenced, resulting
                    in a crash. Make sure at least a single chunk is present.

   - CVE-2006-2935: A stack based buffer overflow in CDROM / DVD handling was
                    fixed which could be used by a physical local attacker
                    to crash the kernel or execute code within kernel
                    context, depending on presence of automatic DVD handling
                    in the system.

   - CVE-2006-3626: A race condition allows local users to gain root
                    privileges by changing the file mode of /proc/self/
                    files in a way that causes those files (for instance
                    /proc/self/environ) to become setuid root.

    The SUSE Linux 9.1 kernel update is the final SUSE Linux 9.1 YOU
    update (see separate announcement from some days ago).

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes


     SPECIAL INSTALLATION INSTRUCTIONS
     =================================
     The following paragraphs guide you through the installation
     process in a step-by-step fashion. The character sequence "****"
     marks the beginning of a new paragraph. In some cases, the steps
     outlined in a particular paragraph may or may not be applicable
     to your situation. Therefore, make sure that you read through
     all of the steps below before attempting any of these
     procedures. All of the commands that need to be executed must be
     run as the superuser 'root'. Each step relies on the steps
     before it to complete successfully.


   **** Step 1: Determine the needed kernel type.

     Use the following command to determine which kind of kernel is
     installed on your system:

       rpm -qf --qf '%{name}\n' /boot/vmlinuz


   **** Step 2: Download the packages for your system.

     Download the kernel RPM package for your distribution with the
     name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
     modules that are not free were moved to a separate package with
     the suffix '-nongpl' in its name. Download that package as well
     if you rely on hardware that requires non-free drivers, such as
     some ISDN adapters. The list of all kernel RPM packages is
     appended below.

     The kernel-source package does not contain a binary kernel in
     bootable form. Instead, it contains the sources that correspond
     with the binary kernel RPM packages. This package is required to
     build third party add-on modules.


   **** Step 3: Verify authenticity of the packages.

     Verify the authenticity of the kernel RPM package using the
     methods as listed in Section 6 of this SUSE Security
     Announcement.


   **** Step 4: Installing your kernel rpm package.

     Install the rpm package that you have downloaded in Step 2 with
     the command

         rpm -Uhv <FILE>

     replacing <FILE> with the filename of the RPM package
     downloaded.

     Warning: After performing this step, your system may not boot
              unless the following steps have been followed
   	     completely.


   **** Step 5: Configuring and creating the initrd.

     The initrd is a RAM disk that is loaded into the memory of your
     system together with the kernel boot image by the boot loader.
     The kernel uses the content of this RAM disk to execute commands
     that must be run before the kernel can mount its root file
     system. The initrd is typically used to load hard disk
     controller drivers and file system modules. The variable
     INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
     modules are loaded in the initrd.

     After a new kernel rpm has been installed, the initrd must be
     recreated to include the updated kernel modules. Usually this
     happens automatically when installing the kernel rpm. If
     creating the initrd fails for some reason, manually run the
     command

       /sbin/mkinitrd


   **** Step 6: Update the boot loader, if necessary.

     Depending on your software configuration, you either have the
     LILO or GRUB boot loader installed and initialized on your
     system. Use the command

       grep LOADER_TYPE /etc/sysconfig/bootloader

     to find out which boot loader is configured.

     The GRUB boot loader does not require any further action after a
     new kernel has been installed. You may proceed to the next step
     if you are using GRUB.

     If you use the LILO boot loader, lilo must be run to
     reinitialize the boot sector of the hard disk. Usually this
     happens automatically when installing the kernel RPM. In case
     this step fails, run the command

       /sbin/lilo


     Warning: An improperly installed boot loader will render your
              system unbootable.


   **** Step 7: Reboot.

     If all of the steps above have been successfully completed on
     your system, the new kernel including the kernel modules and the
     initrd are ready to boot. The system needs to be rebooted for
     the changes to be active. Make sure that all steps have been
     completed then reboot using the command

       /sbin/shutdown -r now

     Your system will now shut down and restart with the new kernel.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv <file.rpm>

   to apply the update, replacing <file.rpm> with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/apparmor-parser-2.0-21.5.i586.rpm
          9cd9a522ee1844e945b580697cf23ad9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-1.1.3-23.3.i586.rpm
          89d2201c3dbc746ec24cf4bd4cb44559
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-devel-1.1.3-23.3.i586.rpm
          72540e4f65fd2edf1782a75114fccb9f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-libs-1.1.3-23.3.i586.rpm
          4cf153c5f2f544d0766a00fa83b3c8ef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-bigsmp-2.01_2.6.16.21_0.13-22.3.i586.rpm
          6bdf25dbf6a23a529fcb03a64b17cebf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.i586.rpm
          a844ad701dd378b34a4cadc0e4c22e6f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.i586.rpm
          dff4d32521e85e17d4f8ff6adca93949
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.i586.rpm
          cef9a15763ee6932c53ee21473cd4997
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.i586.rpm
          ba16f758468d56f1d7923db3b0904631
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cloop-kmp-xenpae-2.01_2.6.16.21_0.13-22.3.i586.rpm
          2c43fb6f07d4bfe9b93870e5427c1895
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-0.7.18-3.3.i586.rpm
          e7b20cfae135aa61d35b7a5b21c74330
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-bigsmp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          909215493b300108c63119ab9f096d79
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          e113b1b042ae80eab80c23c4c28cf97f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          b69e5fc59ca5d0c240fd53fc98a5484a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          6c9bac44ad763009d4331401d3ac10ec
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          3188da9046488df7bed609ffd7ce54fe
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-kmp-xenpae-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
          bb3ef37bcb236e56be33e14e1e367983
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-bigsmp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          b9ecda8924b39c2ef58543daeb27f35f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          410388ef1c72ff622aa163a5c2d9df4c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          afb6655fed055160232e9e88da940b24
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          23bab134a07330c207e7318843c82a79
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          4797651065a56662beb54b0a6bc88b12
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/hbedv-dazuko-kmp-xenpae-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
          77832a824919e683087693f24db509f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-bigsmp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          57aefc602afcb1d96e386a748c84077f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          641354f8153682d9657809ff3de2ceef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          32c3dd5b3aa99ba22851a5b8437c3198
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          261b6e2cef8380c105f1175813b6652e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          2b0a21a904508d395e3fb6ae250bb97d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ivtv-kmp-xenpae-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
          bdb122fa51617514703c0e6655976ecb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-bigsmp-2.6.16.21-0.13.i586.rpm
          a7cd535abc7d7369df33218549a40641
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-debug-2.6.16.21-0.13.i586.rpm
          76afdaa38402761b7a4547d346128d12
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-default-2.6.16.21-0.13.i586.rpm
          c02ef80cf6259e9c2e2367d906ddbce5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-kdump-2.6.16.21-0.13.i586.rpm
          7d2ae84459eb40f27eb27ccd17f40065
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-smp-2.6.16.21-0.13.i586.rpm
          bb548b149f045f71f0cc77cdeab3554e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-source-2.6.16.21-0.13.i586.rpm
          06f6819e6b542f818dfc1cf8b177d21c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-syms-2.6.16.21-0.13.i586.rpm
          c03b63fe79c14b963c2ca952d741507b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-um-2.6.16.21-0.13.i586.rpm
          47dfc55b417521fc8f89719a26590b8b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xen-2.6.16.21-0.13.i586.rpm
          ce2c2a0c3d8f8de549f7f9e464b215c6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xenpae-2.6.16.21-0.13.i586.rpm
          0ebf3e42683ade314e2eb216ee11de72
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kexec-tools-1.101-32.17.i586.rpm
          28f60804adcf7e5d19ec52b4d64de043
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-bigsmp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          67b4f753cc31f80de61e6c3b46511ad8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          fe279b89071ac503553a3ef9f7006ccb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          b051b17aaa7f5f3faddd7ae04e17b25b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/lirc-kmp-xenpae-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
          91e65fa9b282efc42f012b27f55db16c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/mkinitrd-1.2-106.15.i586.rpm
          3f795b29fdf6a9bc66eb42c8686c7977
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/multipath-tools-0.4.6-25.9.i586.rpm
          d8dafe24a0f64529fa92a7f21acd88dd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-bigsmp-1.10_2.6.16.21_0.13-19.3.i586.rpm
          e5a0788af9f6f93be7592212fa4e1d4f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.i586.rpm
          188cdc73cf94c84cef6d9bfec587da9d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.i586.rpm
          9b8abac21a6ed044bdde306d27f97b03
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.i586.rpm
          2865814e726de3c07e4a63433e2408ae
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.i586.rpm
          d49abd0a6bd8319a6bf35665cb20e1f1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ndiswrapper-kmp-xenpae-1.10_2.6.16.21_0.13-19.3.i586.rpm
          38bbad45bd3915010d26dd7dbf07b570
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-bigsmp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          a20595f9f88f23363aea1e281a853bb9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          e266f1647fd1d9b3fe53782249aa8017
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          21c7664b863b822b7e6fca494167dca7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          206c4c2c37edbe12a532d7df17992fe5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          74f8ee6ce6fb0ba4264027d82dedfed2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/novfs-kmp-xenpae-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
          684fe3618c802c5949c16c2e23490fa7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-bigsmp-20060126_2.6.16.21_0.13-3.1.i586.rpm
          aa274c0190792577dae5400fecad7642
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.i586.rpm
          b37e5f6d1afff4d17236e781e908c4a2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.i586.rpm
          504aee4caf372688dd59254b4296a071
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.i586.rpm
          826ef0e62b77ee7db3515c4f81d918fb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.i586.rpm
          ba37438f88bb172e407d6e4db00fab9a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.i586.rpm
          3976e689381649ba359466ba5f891322
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/omnibook-kmp-xenpae-20060126_2.6.16.21_0.13-3.1.i586.rpm
          cb6ef7570da4621c6db5c23bbe9e382e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/open-iscsi-0.5.545-9.13.i586.rpm
          99aa6db3390acb91b9c67ac251c2ffc3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/openafs-kmp-xenpae-1.4.0_2.6.16.21_0.13-21.1.i586.rpm
          a56246ac270979f33de6dff3aa6b9d43
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-bigsmp-0.44_2.6.16.21_0.13-15.1.i586.rpm
          afa731bcb72c96c2e3554518143a2941
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.i586.rpm
          8479ea66ef737620144bfa24d5793005
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.i586.rpm
          702881557801a075ae91c8662556181d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.i586.rpm
          fc4dfe6ba9c75dacbd9f4cf5f3b4dfbd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.i586.rpm
          82ace92edf245eceddd502b65632b4af
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-bigsmp-4.17_2.6.16.21_0.13-30.3.i586.rpm
          26815c7856a9b3e2912bba2e10baac34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-debug-4.17_2.6.16.21_0.13-30.3.i586.rpm
          be232e269a6067bd2d936f16e6c8a3a6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-default-4.17_2.6.16.21_0.13-30.3.i586.rpm
          c4c56fbf67434f5f2939dd4e85cf6108
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/tpctl-kmp-smp-4.17_2.6.16.21_0.13-30.3.i586.rpm
          90fda039097bcb9dfea77c93321895e4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/udev-085-30.11.i586.rpm
          73a5ffcaeea72c89632f6597113fa435
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-bigsmp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          749b7ec34a2cd0864cd296419bdafcd8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-debug-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          a0eb6f7674520a01b151c490dc342dc7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-default-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          37a4e14ce1ec4965f26e1326d7241762
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-smp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          5c9926a62a9e5096ce63349acbe89724
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-xen-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          d2410737db46df9bada726bfc2416a2c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/usbvision-kmp-xenpae-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
          694c781f29dccaa1f26fcd58c79d4371
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-bigsmp-1_2.6.16.21_0.13-12.6.i586.rpm
          01f91c7bd6eb1ca1edf5bee04ea2786a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-debug-1_2.6.16.21_0.13-12.6.i586.rpm
          5a1adb87796cc4dc05dd38ff285e3408
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-default-1_2.6.16.21_0.13-12.6.i586.rpm
          38786dc33bfa6f02d3aa1bf997d25398
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-smp-1_2.6.16.21_0.13-12.6.i586.rpm
          0b4cbdb97296ee00c6a67179f4b4efb7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-xen-1_2.6.16.21_0.13-12.6.i586.rpm
          f139106bdfbc3e4faf1f4bad2a5f326b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/wlan-kmp-xenpae-1_2.6.16.21_0.13-12.6.i586.rpm
          14ed4ae45d2d65ad5c78581940bb353a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-3.0.2_09749-0.7.i586.rpm
          59d56377f67d382fa5adca980a21caa8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-devel-3.0.2_09749-0.7.i586.rpm
          2b7d4f9881b452a48abff40cf56241f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-html-3.0.2_09749-0.7.i586.rpm
          59363777b0f98db4f96722fc95752866
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-pdf-3.0.2_09749-0.7.i586.rpm
          0fa70e52865138e9644a24c036e3bda2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-doc-ps-3.0.2_09749-0.7.i586.rpm
          ad5649957c67a8ecf5fae796fb7e40db
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-libs-3.0.2_09749-0.7.i586.rpm
          e2c1e535725b5b24cd19c51a0e8dc8f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-tools-3.0.2_09749-0.7.i586.rpm
          0cadd80f58357b3135825cba81785b56
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xen-tools-ioemu-3.0.2_09749-0.7.i586.rpm
          8387b6d495aa45270872f60aabc1c394
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-bigsmp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          f7b74bcb292788f9cc5c584a01a9a47b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          42a59aacc105356cfa1565cad548fd88
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          d4c16bdda9973cec6f66b6cb6216e7d1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          042d4daa42d5941ed5efce7d10c72c25
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          cd8d8148c21c5acb1739ba3467dfe119
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/zaptel-kmp-xenpae-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
          d4b664e27c6c8ec2eb4154d73b498171

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.6.i586.rpm
          f1a8ba80079b81685d9426f09b64bb99
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.11.i586.rpm
          d2390ddccfaad103ae4d80fb59a73800
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.11.i586.rpm
          f45d3b6f92c7e07be02ac7c45d6d2420
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.11.i586.rpm
          d5ddb4d7c4e729712abd31c16d1d00fb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.11.i586.rpm
          5354e1fa6372548bb998eacbb438fc9d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.11.i586.rpm
          f358de08699bfbd90c2a96b63d04ebe9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.11.i586.rpm
          002fde4bfccb45b7b928f2d6cb175702
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.11.i586.rpm
          8dcc7463d139b67f4058196077fd77bb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.11.i586.rpm
          82ef2c427e48d71d088bccdd3090051d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.11.i586.rpm
          4cada92e8b362a18a6cb2e7b9dad1867
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.11.i586.rpm
          a5c1fb1d7ba62cb7d47e1ebc68b6043b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.11.i586.rpm
          e2e53924d3dd90ae1ed6fd6cf65e5a98
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.11.i586.rpm
          cd9bad0b01cdad5dc70d4fbc82352af0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.11.i586.rpm
          d0af6de05ca9a572cf9ea25ba702867c

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.7.i586.rpm
          fb640315cdcf43f2ffd7f6f51828eccc
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.13.i586.rpm
          474bcbd50739da47319f62ea9efac697
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.13.i586.rpm
          f591a96ebe1788fa7503ed80b35f4b9b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.13.i586.rpm
          00c44c19362f6256a95496de93500524
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.13.i586.rpm
          cc6aebefa35a4bca90cc22cf4522fe97
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.13.i586.rpm
          00dfc63513b64f9aa6534ee0424a4d42
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.13.i586.rpm
          cfab4802ff6cdb522494690a53166bbe
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.13.i586.rpm
          a8b6221034411bf63093fa7c2b8e6ad4
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.13.i586.rpm
          267669734dc0e95e2bdf96a4c9ce5321
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.13.i586.rpm
          31d0831adab64bbf848433c2b0b68db8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.13.i586.rpm
          751dad14c0578d2522cad557ad00f13f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.13.i586.rpm
          32523934ffd726b303cd7650168262f2
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.13.i586.rpm
          5155c42795497c07f27093677b011d2c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.7.i586.rpm
          23bb3edd5eccdbfdba9abcfb1c356a7c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.7.i586.rpm
          7e0d874eacfb71671ef2cce0287f8cb0
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.13.i586.rpm
          7e561721fad94a6d744864bce5dd551e

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.16.i586.rpm
          bb0396417107d32fed4997d7a70b37f9
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.24.i586.rpm
          bde42b68a6ed0eb3c3633ceb125f348c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.24.i586.rpm
          ef4c6540b77fa646649fdc473039a569
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.24.i586.rpm
          740f4bb7cbb56cf55360bf4a1edf32fe
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.24.i586.rpm
          19313402b487108c4ef883dfcb7aa03e
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.24.i586.rpm
          4acac5fcacfb83abe2326c880a9ab94b
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.24.i586.rpm
          d5649a51a381106a7733bfe093c71bc4
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.24.i586.rpm
          0415a737781d2906b3d380ccf3946dc7
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.24.i586.rpm
          5bf912e55bb0fb5aec445eafa0075784
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.24.i586.rpm
          f56fe753c10797532e7239b9a68e97d6
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.24.i586.rpm
          a2f9dbcacff96e556ff82cc716417ed5
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.16.i586.rpm
          5a062eb816a7a4638f9261ba98767dd2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.15.i586.rpm
          9e31db031ba57f3af146a17d9597986f
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.24.i586.rpm
          0f9837aa3de9897a5983af8726615339

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.276.i586.rpm
          ceba69d6952612d1cc2434b8da1cbf75
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.276.i586.rpm
          1c1d3680df647755a922fbf8028b58b9
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.276.i586.rpm
          217d25d2d474d4f7eb974d966fd4c926
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.276.i586.rpm
          aabe3bb797ddaacc5f19b144d37b4be5
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.276.i586.rpm
          d87358add6318890f66d0de62a2bcbea
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.24.i586.rpm
          d8eadd159248361b0a9ee0e0cb3f4168

   Platform Independent:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-admin_en-10-7.5.noarch.rpm
          8a183fb7f7b69af041e1f6f4a5b46d68
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-docs-2.0-17.5.noarch.rpm
          827b675a6c216ec32902183c79433479
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-profiles-2.0-34.9.noarch.rpm
          f6ae693557732b8f27eba4dfde4a9eb4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/apparmor-utils-2.0-23.5.noarch.rpm
          acb673a77bfe60d6d036e60f5b19764b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/noarch/yast2-apparmor-2.0-27.5.noarch.rpm
          83c76ee5e56846ec7545d5fe0bf25098

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.13.noarch.rpm
          1ebb82bcf1316493ca8b4355db932d0b

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.24.noarch.rpm
          e7d6caf8cb9c23119d181b98efaf7ba7

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.276.noarch.rpm
          ece4fe625855902c637abe9f1252f6d4
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.276.noarch.rpm
          556b8059e67605daa9d789907db10778

   Power PC Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/apparmor-parser-2.0-21.5.ppc.rpm
          f630cd2887055b6442706a229bd79f34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-1.1.3-23.3.ppc.rpm
          8aa6cc2de24e4bb4d4c74307986ca354
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-devel-1.1.3-23.3.ppc.rpm
          f7e3b65e5754df2c7e3f81387f4dfce5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-libs-1.1.3-23.3.ppc.rpm
          5c6861388a938b80c266a1932fac85d0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          ac3295455812a021ad5f239ab56287cb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-iseries64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          8dd405813e14d317831dc5b6a657d55d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cloop-kmp-ppc64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
          c59982049da9a11ebf26e3ac477442ab
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-0.7.18-3.3.ppc.rpm
          fdcc271b40cfc14985951fb94154c0ef
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          16e8bf1e04d4574ea116fd8a9617c5ed
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-iseries64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          0e648065b5442763404396603e1c2782
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-kmp-ppc64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
          a7dcee57666e9ca61d4dea5b4953655b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-default-2.6.16.21-0.13.ppc.rpm
          e37ef749e89e0785dee5cb0bb1efa740
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-iseries64-2.6.16.21-0.13.ppc.rpm
          1623a8a97419a2272027aa166430860a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-kdump-2.6.16.21-0.13.ppc.rpm
          76c9fdf080d3697ba2b97a18b3c031f8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-ppc64-2.6.16.21-0.13.ppc.rpm
          181a7668969c02dd217f77f795f88214
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-source-2.6.16.21-0.13.ppc.rpm
          216d42cb7f22a423bb62b1af3124ca5a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-syms-2.6.16.21-0.13.ppc.rpm
          2442412bc80a1301b3cf4a8e491e1a1d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          583928fdc71ae4a8790bc1d04be092d0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-iseries64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          0c617c35763488383d31e09776981ffc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/lirc-kmp-ppc64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
          b64cd82811dc7d7f279b87e5dbc51276
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/mkinitrd-1.2-106.15.ppc.rpm
          70ca7ada636755d8ba1d159d38cfb98c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/multipath-tools-0.4.6-25.9.ppc.rpm
          0df9787c0d34cdde227e76218accbafb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/open-iscsi-0.5.545-9.13.ppc.rpm
          8b19b4b4d10841fc0edcfad8bead5321
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.ppc.rpm
          108d8f2c2b660bfd805ef76820a8a835
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcfclock-kmp-ppc64-0.44_2.6.16.21_0.13-15.1.ppc.rpm
          0dab492bad5d5815c678df2987ebae62
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.ppc.rpm
          61cd65508674e71fe619bec2fb9026f3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/udev-085-30.11.ppc.rpm
          4571532a54b7e221448b324ca994e4d1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-default-1_2.6.16.21_0.13-12.6.ppc.rpm
          079bb0db9f9396f5daf64cb00246bbd1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-iseries64-1_2.6.16.21_0.13-12.6.ppc.rpm
          835067ccf55f42ed34cff08e9b6ffce4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/wlan-kmp-ppc64-1_2.6.16.21_0.13-12.6.ppc.rpm
          3bd1bb0e1150dc95f94858e956f4dc22
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.ppc.rpm
          068e5337926200f980be3dcb67c2eb98

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.11.ppc.rpm
          8351be43b5c3896df83c63ba65cfeb5a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.11.ppc.rpm
          7747fa43d835b3320b3a3fa54f235013
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.11.ppc.rpm
          18c443c60f7829c88bd821fb865046ac
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.11.ppc.rpm
          06cf812b56183eb5156e344db7fe310c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.11.ppc.rpm
          2f44c721c158dd9f56a497223b54431d

   x86-64 Platform:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/apparmor-parser-2.0-21.5.x86_64.rpm
          060873e93856d7954d33812f2cb26c13
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-1.1.3-23.3.x86_64.rpm
          a3149bc43d13af6a808efce907f11b53
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-devel-1.1.3-23.3.x86_64.rpm
          48d28c73627c036e60fbcba5daa889ff
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/audit-libs-1.1.3-23.3.x86_64.rpm
          dee93d43a783ebf6ca16202a1382118f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          dc2bb193b8f30b6d3444aa9371826d23
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          df81804f31015ce6baf0eec3354a75b9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          a9f20351762bccc74ebc1df2d5b5adf4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
          1013121fc139ace267bb33f3b10e114d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-0.7.18-3.3.x86_64.rpm
          44025e09c1571e735f82d4d60e71fc0b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          3331bff87496d9e9afa1fb83919b1111
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          2b85c2e78d4ecb2e0e21f7908c7257f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          bd3e07b7356c64b541be792c97868d19
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
          35ee253010ade83dc595c8a27f308335
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          d845a7df15fdb571df85b31e6a667005
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          a3f8918d10b82a61042f3044a695e877
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          82f20f84b58d676999e5e909336c66b7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
          c5584a0cbbc8d0fef477afe195dcf277
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          fe4d8f6e1297c41dd04b1dc6473d47c1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          1a03723657be633a35162e31940ae647
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          66875b4b65f2e48df27491a2d0d93de9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
          0e8f15d78033b73a96440736820e5cbb
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-debug-2.6.16.21-0.13.x86_64.rpm
          d237873002ea1a5501f3b61f76b6903c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-default-2.6.16.21-0.13.x86_64.rpm
          f44e5a424121b256b3c1287997ba4061
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-kdump-2.6.16.21-0.13.x86_64.rpm
          170baeb8f839651598ddbcbf93aa4670
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-smp-2.6.16.21-0.13.x86_64.rpm
          d32a01850aebf660e1a740c2f9b9927a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-source-2.6.16.21-0.13.x86_64.rpm
          8002fc7b644f2c64c258400f29050e5d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-syms-2.6.16.21-0.13.x86_64.rpm
          9c7549f01707a434c0247f73eb9b0152
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-xen-2.6.16.21-0.13.x86_64.rpm
          9ecef38e308f2e4ef644e832fee15a8b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kexec-tools-1.101-32.17.x86_64.rpm
          121b57cabdcb74e90f3992ad2a7843c8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
          84ef08317d3bcf6552ec57a0487349e0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
          64898d1f8f8e98ab43f2d52a10bd3a52
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/mkinitrd-1.2-106.15.x86_64.rpm
          49bee58e184fe82330f0b9c1720a97f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/multipath-tools-0.4.6-25.9.x86_64.rpm
          e01336dc8e630ffa76918c4e487dba9f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          fe54b39f60d50c48f25d9e756212991e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          2906ea2b8c781eda354a83bcd668ea10
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          16ee21b17dcd1e5c3db212d9b9f281ba
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
          59f733077e5cf2d208802599111778b1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          6bce5050ab3d11597c129b2a86a22599
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          b033fe6ec282491fc8227718a2ccddb3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          e0a234ff6261e1b3d28afcfb1b09cb52
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
          e262ada6e83e80b394f84deb18d367c7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          1ba9eece36909166f129f3a05c5b0a34
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          0c61295b0a053475f6a31619f761d67d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          28c2c42e81b473b533800c26fb161db8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          b490a216fad445f0499dabb64307de75
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
          f72df7eddb5a3f417878e5680fab5cd1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/open-iscsi-0.5.545-9.13.x86_64.rpm
          c51104356caeb53cd189079bfc8f7bb4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          5487af5844e98b6a3d51394671d19fd5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          5547a66c2172a1e37cf83352a2971bf7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
          fbd677b5ef2747de9f038efb55ff5162
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.x86_64.rpm
          01f40956b13ece3ffac89484d99784f1
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/udev-085-30.11.x86_64.rpm
          149b04dbd960e9c853578c5357ce142d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-debug-1_2.6.16.21_0.13-12.6.x86_64.rpm
          3356f6a1d58c98344b354fc556a7ed32
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-default-1_2.6.16.21_0.13-12.6.x86_64.rpm
          3fcf84553e3039c1ad1659681fa59c4f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-smp-1_2.6.16.21_0.13-12.6.x86_64.rpm
          c9c8d7587bd5922fb0d87d066f402d72
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/wlan-kmp-xen-1_2.6.16.21_0.13-12.6.x86_64.rpm
          dffd5eab1d7e201b8802b96bd5b39030
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-3.0.2_09749-0.7.x86_64.rpm
          8f08be21026a337d1331288d0ed33192
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-devel-3.0.2_09749-0.7.x86_64.rpm
          9e9806f40e6ab9961543306d1ee236cf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-html-3.0.2_09749-0.7.x86_64.rpm
          7ef2bf1b781916f5a778804380ad921b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-pdf-3.0.2_09749-0.7.x86_64.rpm
          04e9674d20bbbf8785b5cfcc2131e7da
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-doc-ps-3.0.2_09749-0.7.x86_64.rpm
          a0b1277b24d9c2c0a46557bb6f4e4473
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-libs-3.0.2_09749-0.7.x86_64.rpm
          b5eb3c8eb334d8f09bce0ec67d9e9ca7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-libs-32bit-3.0.2_09749-0.7.x86_64.rpm
          9955c0c24e174ec83f46ce52e76ab98e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-tools-3.0.2_09749-0.7.x86_64.rpm
          523ccc5bee4cfdbb9b1b7080f9a05649
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/xen-tools-ioemu-3.0.2_09749-0.7.x86_64.rpm
          08159c0dd7ea459396d5de547e75d7f0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          b2499ba0ba2367da270f690b75ee40c8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          45d781cffb80f6d8bd5d58be522aa2f4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          7ad169812c058a21be7b49fd86fd9237
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
          f9c0361874d265be3e6e2e8ef66ae635

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.11.x86_64.rpm
          b85489f0ad8cc9bbb5728c64e7c8fc2f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.11.x86_64.rpm
          4e132e7adbada352e112c64a3c9f2408
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.11.x86_64.rpm
          087fea22e9d90ef98337c30f55318db3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.11.x86_64.rpm
          e6f47d4bd1fda55cabf5a59b62c2e183
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.11.x86_64.rpm
          0a6f8350214710e2f600ac204eb1a0a5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.11.x86_64.rpm
          5fff86f3834368fa34c5e32855f44d0c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.11.x86_64.rpm
          f87081d87e0f9c7d3ba627309107bddf
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.11.x86_64.rpm
          b8d9b58c238d533550ccce278dad30f0

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.13.x86_64.rpm
          43f6fb67727c88b0f4aeda733120ac84
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.13.x86_64.rpm
          bf333ee5088cc7f5a4888530557fb719
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.13.x86_64.rpm
          be4142bb00d29a20b18159add573fc74
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.13.x86_64.rpm
          8c47ed2a4949b3e9aaa046830472b2ef
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.13.x86_64.rpm
          1d373c25c0590d223f17e1d9feba1f6c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.13.x86_64.rpm
          f21817e9293fc603914958b0eed983ca

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.24.x86_64.rpm
          c4d600c67fa16520e30e4f306c2f174c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.24.x86_64.rpm
          1e5a69fdd455ba1c9317b5386b4f887d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.24.x86_64.rpm
          37a138694706fdd8229d51f75256ca74
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.24.x86_64.rpm
          9ede22ac6b4119995d4c8ea6329f2851
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.24.x86_64.rpm
          9c28c19a989ad975e26c3c4210ab93df
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.24.x86_64.rpm
          ef6477f4e8d9386e8c14e5f33cab6e15

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.276.x86_64.rpm
          a1ec9ed29e7b844639fb264c0c051f79
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.276.x86_64.rpm
          9c18e347968bc60d4e32b67557c1830b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.276.x86_64.rpm
          205bd72a791fd24589330c152f73d18b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.276.x86_64.rpm
          63ada2081021bc1307c6153ccd043b87

   Sources:

   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-admin_en-10-7.5.src.rpm
          43095bf3f55a08d8064a021d6aaa1db7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-docs-2.0-17.5.src.rpm
          abe9f0dc42be1ce5c7590f357d9d134b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-parser-2.0-21.5.src.rpm
          7fe00c347fec96fef49bf0463b209210
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-profiles-2.0-34.9.src.rpm
          c6b49655962246afcc288c2df8eed31f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/apparmor-utils-2.0-23.5.src.rpm
          5257e473bc5e8a6f7c4dccd5e6a9ae55
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/audit-1.1.3-23.3.src.rpm
          cf3d5c02a37d737c0178c72ea84ee203
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/drbd-0.7.18-3.3.src.rpm
          f7c33143e57fb99cf0b392096d9f7d44
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-bigsmp-2.6.16.21-0.13.nosrc.rpm
          9359a72d2f9016a61beb36f6b2f0fa28
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-debug-2.6.16.21-0.13.nosrc.rpm
          4a26cacb10c6dbf2706fadc4b83535e4
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-default-2.6.16.21-0.13.nosrc.rpm
          235efd96d5f7c6ccfc9a398cc8d27108
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-iseries64-2.6.16.21-0.13.nosrc.rpm
          40dc372c825056205aa0c1cc1de2473b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-kdump-2.6.16.21-0.13.nosrc.rpm
          ed77128c1b3433a22c12cb78491d9353
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-ppc64-2.6.16.21-0.13.nosrc.rpm
          d322ff866d8534ad3bc53e6dabc3443d
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-smp-2.6.16.21-0.13.nosrc.rpm
          a4aeb424592289ef78edcdd6cd1449db
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-source-2.6.16.21-0.13.src.rpm
          9173110fbf71bfb007b9a560e3a9bad6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-syms-2.6.16.21-0.13.src.rpm
          02cdf335631f2da95056cba8eda0f165
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-um-2.6.16.21-0.13.nosrc.rpm
          1324aec2bfd8c3530e8f90088cc25c81
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xen-2.6.16.21-0.13.nosrc.rpm
          1250728306b9b3253ae82afedf0f1e4a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xenpae-2.6.16.21-0.13.nosrc.rpm
          f193f3d82e8b0aa15d7ab13a081a7cf2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kexec-tools-1.101-32.17.src.rpm
          3374197c18ba7324995f433a939fbe54
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/mkinitrd-1.2-106.15.src.rpm
          ddf61f16d38e997d85fd04fdf64eaa02
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/multipath-tools-0.4.6-25.9.src.rpm
          261e2516378e1e6596f9ad767a0594bc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/open-iscsi-0.5.545-9.13.src.rpm
          852e15549b54733414a667631052840b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/udev-085-30.11.src.rpm
          330f5f4e04d9448b023301d3ff332305
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/xen-3.0.2_09749-0.7.src.rpm
          9adfc5f7c109b6c7f206d2765b99f1ec
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/yast2-apparmor-2.0-27.5.src.rpm
          279b8397e1cd4fd829b12f09018f46cc

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.6.src.rpm
          4b3fb42d44b1cf10ab6d4ede6bb67fa0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.11.nosrc.rpm
          e05d21d1ad9f1c3ea3268dde157fe13b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.11.nosrc.rpm
          f10fad044c2193fa6261096b223db611
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.11.nosrc.rpm
          3190b4017784a56bb412971d6ed06a1f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.11.nosrc.rpm
          bcfbd7b1edbc5a97d9fda3f540d0be9d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.11.nosrc.rpm
          b590965d0190dfe933b8e3572a190706
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.11.nosrc.rpm
          00a4a6bcab31204089ec8464b070ecf9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.11.src.rpm
          790f0f0352d0f3cceb730a4e06f1951f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.11.src.rpm
          0c017619952331561adfbed8399d7aff
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.11.nosrc.rpm
          c2ed71e73606a5330f55870b8f1d7d38
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.11.nosrc.rpm
          9fcc6eb7846ddd324f4c88a9f1a99eea

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.7.src.rpm
          e84f71edcbbad93da19fca50936e457f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.13.nosrc.rpm
          c2d704c30248e369c1256c9cbda9c792
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.13.nosrc.rpm
          a83446d1d83069403cf167da49f7e4ac
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.13.src.rpm
          515752e1ce2951bf3338664c6db1e93f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.13.nosrc.rpm
          2227766974f9d279173ff67adac2846a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.13.src.rpm
          a7eb9d1dde2fbf036057c3eea7da228f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.13.src.rpm
          bd62cf4acca249292569a439d1b95a08
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.13.nosrc.rpm
          7f5d2e691cf0e2373b85895e7518a1ff
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.13.nosrc.rpm
          f637f470f98d0c2ed239dae6d57461b8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.7.src.rpm
          a070d16b8d8f48d7df10f4a2a7553746
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.7.src.rpm
          a4df9d5558c21e322565bb837443b249

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.16.src.rpm
          df33c271d1a488f4b546947c9100e856
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.24.nosrc.rpm
          4baaed24bac712a743c68e6da5328bbd
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.24.nosrc.rpm
          a12e6479c058a95c5c057359df1f87ac
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.24.src.rpm
          d49b746c707e82b7552e09ca752b012c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.24.nosrc.rpm
          2e4370a418fb2cd663e19f1b5722e8d2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.24.src.rpm
          ddb880da28744d6906698a6d71772b9a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.24.src.rpm
          be826c69b6a717786bc4a42d4558d666
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.24.nosrc.rpm
          73f298756b8c260db19f66045702de42
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.16.src.rpm
          929a46b7e2e7045c182909134c90f764
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.15.src.rpm
          933712007872a733e4f8f2f7a2d6040f

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.276.nosrc.rpm
          86501653c20812d977ea23f47af5c9d3
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.276.nosrc.rpm
          6fc2656d5c81821db987ccfa26ad51ea
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.276.src.rpm
          8541534925706aa2063d874f14a365a6
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.276.nosrc.rpm
          c9a6e3ee6a98005ecd4710a8b0bc8c4e
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.276.src.rpm
          523fd5b4a12c8c666818ea94e9e699e3
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.276.src.rpm
          660abce3f8e14427bbaf17e3fa01d115
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.24.src.rpm
          d259fef3b0115765990fb4e58cee0e40
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.276.nosrc.rpm
          77411e0e5b44ae7ca78bc0e9ed77e646
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.276.src.rpm
          da439bf54800360273231d0a62e00f72
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.276.nosrc.rpm
          862a7fafdee7df50a02aceac09f86017
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.276.src.rpm
          61a48f3900f2c1d2fd389dff0566225d
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.276.src.rpm
          cd0906f0fc78df823b65df1b6de63944

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@suse.de>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

       to verify the signature of the package, replacing <file.rpm> with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum <filename.rpm>

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (FAQ),
    send mail to <suse-security-info@suse.com> or
    <suse-security-faq@suse.com>.

    =====================================================================
    SUSE's security contact is <security@suse.com> or <security@suse.de>.
    The <security@suse.de> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID     Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRMd4lXey5gA9JdPZAQI79gf/R9BbReJKlkRL8YMn8TOrWJXc4sJ1M2xA
SGQV4vq7cuhYPoyiW9TANnRn/w57iBIrwZWUtg4atSENOhjaZrjm8nwiHoSp1xZn
u+iM57hbt38CiPt06CzLf0DrC9vKh7znHhTOXh0/8QeQA+gGF0g1z+LHcmxECkom
JFcZ82lz7jKknTycH8ySo09o25eGUrfhzmpzPb8JLglUUpZ4tXaWN+OJG0c7RiWl
fN8xyq9zyVjxK4uLHwWtIjAUvT3mriJdJU7Snr+11H/mkJEq3Of8LobMFKVVKPTQ
7YweB4E0KwsMBIJpweeT6x+nXEupxtAlKkhBlZpX/9vgmdUjdjZa0w==
=qXhX
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F48396)

Mandriva Linux Security Advisory 2006.124 (PacketStormID:F48396)
2006-07-20 00:00:00
Mandriva  mandriva.com
advisory,kernel,local,root
linux,mandriva
CVE-2006-3626
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-124 - A race condition in the Linux kernel 2.6.17.4 and earlier allows local users to obtain root privileges due to a race condition in the /proc filesystem.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:124
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : July 18, 2006
 Affected: 2006.0, Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A race condition in the Linux kernel 2.6.17.4 and earlier allows local
 users to obtain root privileges due to a race condition in the /proc
 filesystem.
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 e3f50de9b2576f6c7849efee5fa7ccc4  2006.0/RPMS/kernel-2.6.12.24mdk-1-1mdk.i586.rpm
 ac091b0d6eafcf2f2cbcb981bc7f1567  2006.0/RPMS/kernel-BOOT-2.6.12.24mdk-1-1mdk.i586.rpm
 241c8edfd46c8a1af69c97346738715f  2006.0/RPMS/kernel-i586-up-1GB-2.6.12.24mdk-1-1mdk.i586.rpm
 2652cbf99438921d4dd473284173d83a  2006.0/RPMS/kernel-i686-up-4GB-2.6.12.24mdk-1-1mdk.i586.rpm
 96eed9404633064ac54247bfaf79e6b0  2006.0/RPMS/kernel-smp-2.6.12.24mdk-1-1mdk.i586.rpm
 2ebc8c0f8080712c943aadbe34c955a7  2006.0/RPMS/kernel-source-2.6.12.24mdk-1-1mdk.i586.rpm
 f4380595eb6fa81429f56706cdd32c55  2006.0/RPMS/kernel-source-stripped-2.6.12.24mdk-1-1mdk.i586.rpm
 2477f821e4f1351013c3b8f941a8c18d  2006.0/RPMS/kernel-xbox-2.6.12.24mdk-1-1mdk.i586.rpm
 79605a820271776ad7c01ba93e5707dd  2006.0/RPMS/kernel-xen0-2.6.12.24mdk-1-1mdk.i586.rpm
 2af343ed6022e305de43b6c6d6771e97  2006.0/RPMS/kernel-xenU-2.6.12.24mdk-1-1mdk.i586.rpm
 e4a10a2ed21c36c4c36a4555b6a79433  2006.0/SRPMS/kernel-2.6.12.24mdk-1-1mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 87c2a427fc462c4b274f1d31d8030ca3  x86_64/2006.0/RPMS/kernel-2.6.12.24mdk-1-1mdk.x86_64.rpm
 1d3f71f5bff6761b76e659089f1dd04f  x86_64/2006.0/RPMS/kernel-BOOT-2.6.12.24mdk-1-1mdk.x86_64.rpm
 56075fe597ff1b28fe73c76463cb057e  x86_64/2006.0/RPMS/kernel-smp-2.6.12.24mdk-1-1mdk.x86_64.rpm
 194ab270414b5e83d57205f423ae10a8  x86_64/2006.0/RPMS/kernel-source-2.6.12.24mdk-1-1mdk.x86_64.rpm
 087efaca0ebc4274884f7811b168358d  x86_64/2006.0/RPMS/kernel-source-stripped-2.6.12.24mdk-1-1mdk.x86_64.rpm
 e4a10a2ed21c36c4c36a4555b6a79433  x86_64/2006.0/SRPMS/kernel-2.6.12.24mdk-1-1mdk.src.rpm

 Corporate 3.0:
 11825513fe1c738bf6ec48eed5c62807  corporate/3.0/RPMS/kernel-2.6.3.33mdk-1-1mdk.i586.rpm
 169b6d012e5d003ee55c730335968257  corporate/3.0/RPMS/kernel-BOOT-2.6.3.33mdk-1-1mdk.i586.rpm
 9958b7e383199559c7d10ce9a2b908a1  corporate/3.0/RPMS/kernel-enterprise-2.6.3.33mdk-1-1mdk.i586.rpm
 4bfc5af3a33bbd068d5ec7530ebc986f  corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.33mdk-1-1mdk.i586.rpm
 3d3aba1eafca57c61b2e13003aa13120  corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.33mdk-1-1mdk.i586.rpm
 2a6f8c6c36eb3d9c94b24c0e12deb8ac  corporate/3.0/RPMS/kernel-secure-2.6.3.33mdk-1-1mdk.i586.rpm
 f7cd743bde04b4604f20178e84085829  corporate/3.0/RPMS/kernel-smp-2.6.3.33mdk-1-1mdk.i586.rpm
 8b0522f993b6aa19c90d45898b1359fa  corporate/3.0/RPMS/kernel-source-2.6.3-33mdk.i586.rpm
 a608bd9be549327e59f8d61d83516d26  corporate/3.0/RPMS/kernel-source-stripped-2.6.3-33mdk.i586.rpm
 cfe5332861963310091c7fca6c81881e  corporate/3.0/SRPMS/kernel-2.6.3.33mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 5602ec8c0a742c57e7b5c426e08972eb  x86_64/corporate/3.0/RPMS/kernel-2.6.3.33mdk-1-1mdk.x86_64.rpm
 6fda1cf0adebaa87c362e583a449ea97  x86_64/corporate/3.0/RPMS/kernel-BOOT-2.6.3.33mdk-1-1mdk.x86_64.rpm
 690f4bc5987e923f110b0224b7d18c6f  x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.33mdk-1-1mdk.x86_64.rpm
 ad947e405b1ec2d169f6d8e6f0be949a  x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.33mdk-1-1mdk.x86_64.rpm
 deaf89ce9c2a2ab6ca66fcc9563eb5bc  x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-33mdk.x86_64.rpm
 7a13854690a641b7257231d574895de2  x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-33mdk.x86_64.rpm
 cfe5332861963310091c7fca6c81881e  x86_64/corporate/3.0/SRPMS/kernel-2.6.3.33mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 8f589cb12460747b38d715968cf15c21  mnf/2.0/RPMS/kernel-2.6.3.33mdk-1-1mdk.i586.rpm
 c94f96a4467b6241789100a7dd942dcd  mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.33mdk-1-1mdk.i586.rpm
 3c58da2c8bca7299dabf713a2c5d3b18  mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.33mdk-1-1mdk.i586.rpm
 ee74fbe17f8af2c2d6c4396094e4477e  mnf/2.0/RPMS/kernel-secure-2.6.3.33mdk-1-1mdk.i586.rpm
 5b1d9a2e52f4264b5d85514a958a092a  mnf/2.0/RPMS/kernel-smp-2.6.3.33mdk-1-1mdk.i586.rpm
 b76c22b9814c6005177916b235565b23  mnf/2.0/SRPMS/kernel-2.6.3.33mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEvQTfmqjQ0CJFipgRAuHjAJ4mUwgs3i0Wlfu+DoaoiaEEe8jYDgCfSwZi
tAQR33UQxWXo2O+0h9tkuRY=
=M1F6
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F48394)

Ubuntu Security Notice 319-1 (PacketStormID:F48394)
2006-07-20 00:00:00
Ubuntu  security.ubuntu.com
advisory,arbitrary,local,root
linux,ubuntu
CVE-2006-3626
[点击下载]

Ubuntu Security Notice 319-1 - A race condition has been discovered in the file permission handling of the /proc file system. A local attacker could exploit this to execute arbitrary code with full root privileges.

=========================================================== 
Ubuntu Security Notice USN-319-1              July 18, 2006
linux-source-2.6.15 vulnerability
CVE-2006-3626
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  linux-image-2.6.15-26-386                2.6.15-26.45
  linux-image-2.6.15-26-686                2.6.15-26.45
  linux-image-2.6.15-26-amd64-generic      2.6.15-26.45
  linux-image-2.6.15-26-amd64-k8           2.6.15-26.45
  linux-image-2.6.15-26-amd64-server       2.6.15-26.45
  linux-image-2.6.15-26-amd64-xeon         2.6.15-26.45
  linux-image-2.6.15-26-hppa32             2.6.15-26.45
  linux-image-2.6.15-26-hppa32-smp         2.6.15-26.45
  linux-image-2.6.15-26-hppa64             2.6.15-26.45
  linux-image-2.6.15-26-hppa64-smp         2.6.15-26.45
  linux-image-2.6.15-26-itanium            2.6.15-26.45
  linux-image-2.6.15-26-itanium-smp        2.6.15-26.45
  linux-image-2.6.15-26-k7                 2.6.15-26.45
  linux-image-2.6.15-26-mckinley           2.6.15-26.45
  linux-image-2.6.15-26-mckinley-smp       2.6.15-26.45
  linux-image-2.6.15-26-powerpc            2.6.15-26.45
  linux-image-2.6.15-26-powerpc-smp        2.6.15-26.45
  linux-image-2.6.15-26-powerpc64-smp      2.6.15-26.45
  linux-image-2.6.15-26-server             2.6.15-26.45
  linux-image-2.6.15-26-server-bigiron     2.6.15-26.45
  linux-image-2.6.15-26-sparc64            2.6.15-26.45
  linux-image-2.6.15-26-sparc64-smp        2.6.15-26.45

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

This flaw affects Ubuntu 5.04 and Ubuntu 5.10 as well; these releases
will be fixed shortly in a followup advisory.

Details follow:

A race condition has been discovered in the file permission handling
of the /proc file system. A local attacker could exploit this to
execute arbitrary code with full root privileges.

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.45.diff.gz
      Size/MD5:  2124749 3de4c3eddba7030297c1014fcb2c5950
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.45.dsc
      Size/MD5:     2379 cf43e7a36b7481b1addc62d89a21668b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-26.45_all.deb
      Size/MD5:  5157202 633e4b5601b77a1aa53330a117bd3655
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-26.45_all.deb
      Size/MD5:    87296 bef5a59910598b0521d3fbd0ad25dfa8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-26.45_all.deb
      Size/MD5: 44452898 0ef865e266a69bc1136889f2d758ba99

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    22140 145c0e2b255420a9e1b6ee99bfaa3811
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    44776 2b0deb1c70fe6345839d5851f93e1438
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:     2308 79341b75318cd8a7a6db9d9429c5d6be
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    36196 c23d39cbca37f01efa4147bc99e8ac62
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   102026 6649421f576f4971cd17bb9a7c85713d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    38606 eb48b38edfc572bb840d4c9668073578
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    49126 4a4697baddf124ff7d254d2ff5c269e2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   176756 e25baa577d3e8e29efba16133d958306
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    36768 f842e1ed25727d41510dccd02b531402
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   142198 6b541fd4e17c94e311ecea82437f04a9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    51050 25d032b8d27cfd858ed8500fc2e833df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   140418 b4cd447f630fbd5bea775b1326712ee2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   286894 00d57e8b2f997bc199e77badedbbb0b9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    97796 76892c8deeb54ffd6c9801a5a85cc024
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:  1650060 06fa74c82c14c2a0f604c9d43884eeda
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-generic_2.6.15-26.45_amd64.deb
      Size/MD5:   863526 12b6b6baf54ce74bdf6a8713ce7adec8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-k8_2.6.15-26.45_amd64.deb
      Size/MD5:   862470 6880e59c987263d711e6e527c1de0be8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-server_2.6.15-26.45_amd64.deb
      Size/MD5:   864126 789db22c98fcbac57be0dc989db1fba9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-amd64-xeon_2.6.15-26.45_amd64.deb
      Size/MD5:   862066 30000ea6c3eb010e0c8d8d7b639387b2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.45_amd64.deb
      Size/MD5:  6908374 edc160831286b3e5497deb18c948241b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-generic_2.6.15-26.45_amd64.deb
      Size/MD5: 20727036 e4d63cb8abe874f37a1cb024ea7f1812
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-k8_2.6.15-26.45_amd64.deb
      Size/MD5: 20692194 7e26f05722164e9effdb7f2d70e2a3f4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-server_2.6.15-26.45_amd64.deb
      Size/MD5: 21536842 98461292db49d95ef3ad343393b8126e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-amd64-xeon_2.6.15-26.45_amd64.deb
      Size/MD5: 19809674 28d32a5a8bf394100277de30eb245e1a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    15622 f693b6345a931c8a6e6a05655ed981c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   240256 2b54ad6b4241ef0053ece1dd49efbdac
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   202556 7a587550d37d1e93c2b5a02174f0965f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:  1048600 21180878dfecd71900e42bf01ec92c95
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:  1468362 1c02389c831ea292d41b2c4d1ce87401
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   161642 40cc3b4329b3777ef67d388ba7e2b895
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:     9830 d7b95428a804f4284d7facb07a200065
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    80854 0702939877b68c734792c8bd837dba18
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    49168 464786194f715ee8e42f8b36a77685f3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    35158 b15ee8269a4ece06ca32c365cfa7dd74
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    70860 8a7733ce518dd6e26ea074356c8a214b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:     6216 841f43140d6153b6311ed6789838b4fe
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:     9060 15f9818abcce95ec9904180206b9d630
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    57880 e78b401f48aef85dd80e8b78384a0946
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   123326 a379458707541239e50fbed49bd54ffd
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   100576 1966d59db34fe695f749869b02f742b9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    79196 4ee3930269903900cb1b78a45dfeec4e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:  1594696 315b3e652e0cb103aa3487d39059a643
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    72286 d4bf5465e197ec436c39d4783f7fac6f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    12648 93f369cf25d34489bdeb37751638f38e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    33738 f0e3654fbe2a647861d03ffbb0cdeb1e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   138142 c7f83f7d2d8d1b0273074554a03764e8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:    38864 a72ec2738a98cd0a5e4be58ac39d45b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-amd64-generic-di_2.6.15-26.45_amd64.udeb
      Size/MD5:   278746 f3df8187d6c1a2cb8f0567b839e72e80

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    18968 4aae4d7e1fa929feaeb87951aa9cb3ea
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    43458 7ac8fb9a59444c5daa45c5915015362c
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   105200 fde0f98366f76ecc78e2601b145884e5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:     2280 a27f048458128510199d02f8f9cc00d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    34474 c262d827bb23da5f4e42f71b03fa1da5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    96794 506e04f5fea1a9280f3ca82988c94397
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    37070 69e26fc116c5dd8f15fc90305d569798
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    44066 17ae8c273f443ca076fc3d9655e4d446
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   167672 4986d5023d64158594b52cadc5bbdfe8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    33922 9ac8ca91eff623e96ad50f47f253c78a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   137820 d1df23fb5afaabd3e88405eede57518f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    46874 88f84c788eb2888576cde0a2df9070d3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   132752 b7a41868ab5b0782d0d11faf41f117db
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   273450 99acb6319a91bb160cc6d2c0de5e8adc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   102248 cbb5c6e9fee18ecb801aa8a76f4e2f52
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:  1594758 e454ec07b08162079f70993089e33d9b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-386_2.6.15-26.45_i386.deb
      Size/MD5:   853390 7e990a7ca17e0e9462a402ebab44f9d4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-686_2.6.15-26.45_i386.deb
      Size/MD5:   850942 def6964016c0b2722c0fd91ba02f4345
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-k7_2.6.15-26.45_i386.deb
      Size/MD5:   851532 59fbad96c2876bf1fdbc4467df8a96f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server-bigiron_2.6.15-26.45_i386.deb
      Size/MD5:   857056 8294743449733cc0a74ee85fe41d5a76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-server_2.6.15-26.45_i386.deb
      Size/MD5:   853658 4b94db466679b5fbed17e7338b657f80
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.45_i386.deb
      Size/MD5:  6900900 740f3dbc817166e453684fdb4d8ad87d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-386_2.6.15-26.45_i386.deb
      Size/MD5: 21628500 ca7b891c1e91d4398f20941620b7e198
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-686_2.6.15-26.45_i386.deb
      Size/MD5: 22414160 56c6363cae088a0c6b47ebc8569a7b50
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-k7_2.6.15-26.45_i386.deb
      Size/MD5: 22162818 bfa1c8cf52fec41587aefc1ca15c7cae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server-bigiron_2.6.15-26.45_i386.deb
      Size/MD5: 23519152 c981ebe7a4e6d7d5778959f1e5510863
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-server_2.6.15-26.45_i386.deb
      Size/MD5: 23072778 48fc7fe4f71a6cb5ef77b0ce384ecc3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    15496 3e33718bd8e8aa8d0a8906e0d8d342e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   238428 892fceeb19e539fd85eff7a20f4eb6f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   196958 14f329b753daef7c9b9ff40fd444caf0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:  1048362 e15fc6bfea8d0e7f03f91fe63f83e4b4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:  1666460 3a3afc338f694f8132e49d9ce64b0942
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   160810 9d78c6f0b1737472dc57c1d291f34019
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:     9162 ffc0194b6511722d7a6db0f0f4ce6f9e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    76482 80ca093aabbb46c695f939bf4c979d88
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    53250 a2007674c9699f11e2fbad0f3709e034
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    33048 eef9bb2eeee010401ee0cbaff40f026b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    85616 25d864ad4330316e09f263d6888d03b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:     6024 e720a32f2fa893345f74c65d8f10aeff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:     8750 e91e6e010f1be7ed8f19d9e3053122fa
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    53586 e8f96b267f22dec871e3d8ad631adcf5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   130774 3146e81039ec89e14f61c170a265691b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    98126 627595ada4b8e90a568d844099b8ccca
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    77112 bac0313f905f4ee0fe2b604bfe157867
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:  1768382 38efd0f83b14bb70fbd709a93f87e913
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    69554 1da0b439c537d7f494804b55612a8e71
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    11760 05a7eb82ab898af006e667591ee07e3e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    35996 1ea8cbda3d913e91c0d14f83f9186be7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   132274 53e17c0cd2fd5a6584fd11efa777df28
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:    38464 47bf8ab03ff1313283d6d4b061fa2f68
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-386-di_2.6.15-26.45_i386.udeb
      Size/MD5:   299112 e0c036b028c6c57433a452969c65c705

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    23726 c70e1438f55faf5cffc9933cd1ef0f3d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    25942 f48c235ddf5ef438bc79bfbfa1ef8340
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    49310 751aedea99735295737e3fd8347bcdc6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    51520 591278494a9cd0c4b7200f88b17abf4f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:     2298 cd73d6578635cea725d11d3db6bd5018
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:     2474 ace347aa1bcbf5bab75ed7d9a9b772a4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    40116 b66ab0fb3b32b39409d053497158be69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    43682 96bfa6e2d16a5ef52d156ca505319862
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   112348 54addedf209fca4cf8b365de0644b738
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   120418 a735c92aed7b85bb2c293fe73aa01ed8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    40842 b451edb433e7f3ce28e07b54c91778d7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    45340 fceac02b4e6786d7e82326181f624060
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    29020 175a0f5f6d9629bc91f76f29babca1a2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    29886 1aaa6279206afa4cc383dfda9a9de8c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   211380 e8ef7f5e0083432eaad614cf13d8e5ce
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   225176 aed95ebc0075d6a33e83199eef3115dc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    45042 0edc5e08fa0182010e442006795ac090
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    40204 14e5ef70afd8e7e74acdc41a5aa5db07
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:     1926 de82c59680b1224187d2c1a888a37152
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:     2194 6738abca1f3a3644aabe52938a107297
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    80580 88b7b0d4b16a8babd0ee1034da854710
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    85954 56113f6745b15c10a8feca40e70f9cb8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   111620 15184b40ec7774f5967a071e3b3011c2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   125752 004974f0871a9cf1803cb332e83fbbb7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    53402 c1664dbe5e2559680e0c44ce1a5d93bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    58476 49613a87695424ebb12b36589ede0904
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   147642 9364fecd9cbd9e5fbaa56707ecebd0ed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   161428 0523cd94575035b92dc599b0aa108746
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   317478 8ea4e5737c59abff13b48ce7d4d90139
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   287572 857d6a1779b8c1c53590c7f669d3327b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   115852 ec0a3e2526025845dd3c0ab5eb61a3e0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   116518 383a47c3e3f607214e07c9a2f7a78ea1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  1922762 722515bd5e004823f6e00687daa8d0f8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  2434822 ad3abcaf734df97cfae29d3fd19f10c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc-smp_2.6.15-26.45_powerpc.deb
      Size/MD5:   866012 f98a64432ccbd932b16324226ee66922
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc64-smp_2.6.15-26.45_powerpc.deb
      Size/MD5:   861762 355c45944bec554921cdcaad5197cc66
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-powerpc_2.6.15-26.45_powerpc.deb
      Size/MD5:   863948 162832a12265fba0e6ab41daeb9d472d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.45_powerpc.deb
      Size/MD5:  6932554 c08abb4161cd816fd43b6cd5916524e4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc-smp_2.6.15-26.45_powerpc.deb
      Size/MD5: 22664558 0bc7d0ebb1e984880edc2f5c9b008ed2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc64-smp_2.6.15-26.45_powerpc.deb
      Size/MD5: 23558436 c34f015a7797aeadcdacc4b3440eb664
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-powerpc_2.6.15-26.45_powerpc.deb
      Size/MD5: 22248080 b66d1b9c1afe51d2381536506edc84f2
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    17778 79a111e1a9f63480088b6133dc10c235
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    17376 1e6dfec612c4b57a8e599a0ee80acd21
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   261132 7fdd8cac95b5a64ea6f1f3a93f42e160
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   282352 e985c63302b24d1bbce1019158788eed
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   227452 bb7ea69a1d3993461bfddf54ab86c8b5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   248672 3d15a6b9f84271a5ee32c9e52f514da9
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  1048416 168b0e32cb9a195b9741b4d81ac0fe69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  1048570 f1b2d9ba1bf213e029bb2399738fcf8b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  1652022 7544da02fd9db4536cc654588693d727
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  1786894 1ef8ebec55f98597a56bb99468836be3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   250928 6e36307b976e2e72d652c91e593fb242
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   233664 8124dfca5ebc7b1400f878d5887cff90
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    13032 5186ba984a5a11de62d665ecbf1ae1a1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    13518 348079e5a38975b952727a7e984048c6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    84822 843ee5b07d8357cf15dbd9847b21282e
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    52190 d5625ba666ab64e2963dd7e9d5b8f766
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    73928 3abb9a8e5754ff06019fd2517bfea21f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    85842 e4a5b4686adc79dc5155acd31682fe81
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:     6616 bf4456cb41e7ee3aecd1f8271520f855
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:     7054 614728b62e154e39b3e6accbddaba743
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    60356 031f0288035b0c8ec5a5c6142633e603
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    70338 c1a9f45408a9ce40c4a014aa759c64bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   128540 1d7b012267b7fffcb600d6ad0dda8d01
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   157794 66e5d4df03d3249266efa0a69a893747
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   107708 f4f61f9e65b99b5e4cedf04ed518176b
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   125538 5536cad51a4c177571325198554820f6
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    87240 32cade824b2175bf55e4417bbdfca6ad
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    93258 109ea66a1fde7b16ca7ff15d7a040d3a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  2013930 0dd3fd231d469d4afe683a073813b612
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:  1988008 f07c2ebf77068aad3ea87c082a96eae8
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   104104 236f891c4d6ac1faa0bd606b6c8914ff
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   115688 07a2f9a1d6cc3c1d8d5d70474e0af3b1
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    12738 8ba3569ae8b09db6e1cd166f632e8413
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    14436 ec362916b16b8462b68c76e504175628
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    39940 68ce975e0ddcbedfc576dc9431ba0b5f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    41464 17887bbb987a345bc007fe390f4de6de
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   148966 c684706f41ab4fd2b24e7446d565797a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   167630 e35d84f30fe5fc75c22534a61cd1da3f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    42180 545ecd0c22e88669ddae1cecee86af24
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:    44772 c882e3883b535535e719cf97454a4a1f
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   320286 d04d927c203d478ce340fb8192d0f254
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-powerpc64-smp-di_2.6.15-26.45_powerpc.udeb
      Size/MD5:   324712 93c8a7cf64fe7c652a7f99d95fbf78a2

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    50468 f298c2c4823f99985315b1832dd35158
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:     2358 133c6f45b3ff20035733597493dc64bf
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    40238 49c3c6623e37266b140d15e87f5e0c33
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   110300 64d3655112d589ee7f71fe980065d951
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    40724 f839b57703001e85c91513abb4471ae3
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   104214 1063125f8b203c20bb94d7cad8ce5b76
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:     7432 9a8cf26557e3dd01183ebb67eb3788df
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   148790 651eac9f635c5e40329245cea1668728
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:  1707654 5cc7a30b70ed15bb0c98e945799c8307
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64-smp_2.6.15-26.45_sparc.deb
      Size/MD5:   762772 4008ee7a14fd2a4a62d1bc17603732b0
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26-sparc64_2.6.15-26.45_sparc.deb
      Size/MD5:   762228 56d93757c71de040a704dc634d28adee
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-26_2.6.15-26.45_sparc.deb
      Size/MD5:  6946510 bbca9e7a0a58af104586adfbc9d453c7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64-smp_2.6.15-26.45_sparc.deb
      Size/MD5: 14897036 6244ea005db937cbe43977a273a3b819
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-26-sparc64_2.6.15-26.45_sparc.deb
      Size/MD5: 14719726 655442f7cf0c4d200acaa4101fd39196
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:     7418 ccf7a4d70e5e0a2c313ada1aeddafdf4
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   248510 5cd15c30f6ec34a325cec3fa2a691809
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   212258 911e6dc03b6c5e913c04380188af1d69
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:  1048434 051c3dc57f21bfcd78e35bfcbc8af33d
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:  1398968 cb77f7a26ba50f69d8cb8ef58cb04ecc
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    10114 c6a8ea529311de5e34326c11ddd268c5
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    40178 27b6be31dd076b14335e4d5fa9f34cb7
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:     9358 92e73aaa0b6096846f505f8eb3572991
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    61424 ac43add89fae08c233cb036b8a9674bb
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   163002 79b8e6e0fdf6ff6947459b2e0be3aa59
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    63924 7703a1128cba56a28b6af44b86a86076
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:  1235004 35d07ccda16875ca0733cfe05c532cae
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    59308 c11b9373737df9962d80102e2f76697a
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:    37342 58b57fbd8e6daefcea417b6862bb1432
    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-26-sparc64-di_2.6.15-26.45_sparc.udeb
      Size/MD5:   280066 ff06d5c6986b7ff628843167f4644fcd
    

- 漏洞信息

27120
Linux Kernel /proc/self/environ prctl Race Condition Local Privilege Escalation
Local Access Required Information Disclosure, Race Condition
Loss of Integrity
Exploit Public, Exploit Commercial Vendor Verified

- 漏洞描述

Linux kernel contains a flaw that may allow local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root. The issue is triggered by a race condition occurs in '/proc' when changing file status. This flaw may lead to a loss of integrity.

- 时间线

2006-07-17 Unknow
2006-07-17 Unknow

- 解决方案

Upgrade to version 2.6.17.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Linux Kernel PROC Filesystem Local Privilege Escalation Vulnerability
Race Condition Error 18992
No No
2006-07-14 12:00:00 2006-09-28 06:26:00
Discovered by Joanna R. 'h00lyshit' <h00lyshit@yahoo.ie>.

- 受影响的程序版本

Ubuntu Ubuntu Linux 6.06 LTS sparc
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 10
SuSE SUSE Linux Enterprise Desktop 10
S.u.S.E. UnitedLinux 1.0
S.u.S.E. tomboy 10.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Open-Enterprise-Server 1
S.u.S.E. Office Server
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
rPath rPath Linux 1
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Linux kernel 2.6.17 .4
Linux kernel 2.6.17 .3
Linux kernel 2.6.17 .1
Linux kernel 2.6.17 -rc5
Linux kernel 2.6.17
Linux kernel 2.6.17
Linux kernel 2.6.17
Linux kernel 2.6.16 13
Linux kernel 2.6.16 .9
Linux kernel 2.6.16 .8
Linux kernel 2.6.16 .7
Linux kernel 2.6.16 .5
Linux kernel 2.6.16 .4
Linux kernel 2.6.16 .3
Linux kernel 2.6.16 .23
Linux kernel 2.6.16 .21
Linux kernel 2.6.16 .2
Linux kernel 2.6.16 .19
Linux kernel 2.6.16 .18
Linux kernel 2.6.16 .17
Linux kernel 2.6.16 .16
Linux kernel 2.6.16 .12
Linux kernel 2.6.16 .11
Linux kernel 2.6.16 .1
Linux kernel 2.6.16 -rc1
Linux kernel 2.6.16
Linux kernel 2.6.15 .6
Linux kernel 2.6.15 .4
Linux kernel 2.6.15 .3
Linux kernel 2.6.15 .2
Linux kernel 2.6.15 .1
Linux kernel 2.6.15 -rc6
Linux kernel 2.6.15 -rc5
Linux kernel 2.6.15 -rc4
Linux kernel 2.6.15 -rc3
Linux kernel 2.6.15 -rc2
Linux kernel 2.6.15 -rc1
Linux kernel 2.6.15
Linux kernel 2.6.14 .5
Linux kernel 2.6.14 .4
Linux kernel 2.6.14 .3
Linux kernel 2.6.14 .2
Linux kernel 2.6.14 .1
Linux kernel 2.6.14 -rc4
Linux kernel 2.6.14 -rc3
Linux kernel 2.6.14 -rc2
Linux kernel 2.6.14 -rc1
Linux kernel 2.6.14
Linux kernel 2.6.13 .4
Linux kernel 2.6.13 .3
Linux kernel 2.6.13 .2
Linux kernel 2.6.13 .1
Linux kernel 2.6.13 -rc7
Linux kernel 2.6.13 -rc6
Linux kernel 2.6.13 -rc4
Linux kernel 2.6.13 -rc1
Linux kernel 2.6.13
Linux kernel 2.6.12 .6
Linux kernel 2.6.12 .5
Linux kernel 2.6.12 .4
Linux kernel 2.6.12 .3
Linux kernel 2.6.12 .2
Linux kernel 2.6.12 .1
Linux kernel 2.6.12 -rc5
Linux kernel 2.6.12 -rc4
Linux kernel 2.6.12 -rc1
Linux kernel 2.6.12
Linux kernel 2.6.11 .8
Linux kernel 2.6.11 .7
Linux kernel 2.6.11 .6
Linux kernel 2.6.11 .5
Linux kernel 2.6.11 .12
Linux kernel 2.6.11 .11
Linux kernel 2.6.11 -rc4
Linux kernel 2.6.11 -rc3
Linux kernel 2.6.11 -rc2
Linux kernel 2.6.11
Linux kernel 2.6.10 rc2
Linux kernel 2.6.10
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Trustix Secure Linux 3.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Linux kernel 2.6.9
Linux kernel 2.6.8 rc3
Linux kernel 2.6.8 rc2
Linux kernel 2.6.8 rc1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Linux kernel 2.6.8
Linux kernel 2.6.7 rc1
Linux kernel 2.6.7
Linux kernel 2.6.6 rc1
Linux kernel 2.6.6
Linux kernel 2.6.5
Linux kernel 2.6.4
Linux kernel 2.6.3
Linux kernel 2.6.2
Linux kernel 2.6.1 -rc2
Linux kernel 2.6.1 -rc1
Linux kernel 2.6.1
Linux kernel 2.6 .10
Linux kernel 2.6 -test9-CVS
Linux kernel 2.6 -test9
Linux kernel 2.6 -test8
Linux kernel 2.6 -test7
Linux kernel 2.6 -test6
Linux kernel 2.6 -test5
Linux kernel 2.6 -test4
Linux kernel 2.6 -test3
Linux kernel 2.6 -test2
Linux kernel 2.6 -test11
Linux kernel 2.6 -test10
Linux kernel 2.6 -test1
Linux kernel 2.6
Linux kernel 2.6.15.5
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Avaya S8710 CM 3.1
Avaya S8700 CM 3.1
Avaya S8500 CM 3.1
Avaya S8300 CM 3.1
Linux kernel 2.6.17 .5

- 不受影响的程序版本

Linux kernel 2.6.17 .5

- 漏洞讨论

The Linux kernel is prone to a local privilege-escalation vulnerability because of a race-condition in the 'proc' filesystem.

This issue allows local attackers to gain superuser privileges, facilitating the complete compromise of affected computers.

The 2.6 series of the Linux kernel is vulnerable to this issue.

- 漏洞利用

The following exploit code is available:

- 解决方案

This issue has been addressed with the 2.6.17.5 kernel release.

Please see the vendor advisories for details.


Linux kernel 2.6 -test6

Linux kernel 2.6 -test4

Linux kernel 2.6 -test2

Linux kernel 2.6 -test9-CVS

Linux kernel 2.6 -test7

Linux kernel 2.6 -test9

Linux kernel 2.6 -test10

Linux kernel 2.6.1 -rc2

Linux kernel 2.6.1

Linux kernel 2.6.10 rc2

Linux kernel 2.6.10

Linux kernel 2.6.11 -rc3

Linux kernel 2.6.11 .11

Linux kernel 2.6.11 .7

Linux kernel 2.6.12 .4

Linux kernel 2.6.12 .1

Linux kernel 2.6.12 -rc4

Linux kernel 2.6.12 .2

Linux kernel 2.6.12 -rc1

Linux kernel 2.6.13 -rc4

Linux kernel 2.6.14 .4

Linux kernel 2.6.14 .1

Linux kernel 2.6.14 .3

Linux kernel 2.6.15 -rc6

Linux kernel 2.6.15

Linux kernel 2.6.15 -rc1

Linux kernel 2.6.15 -rc3

Linux kernel 2.6.15 .4

Linux kernel 2.6.15 -rc4

Linux kernel 2.6.15 .6

Linux kernel 2.6.16 .3

Linux kernel 2.6.16 .9

Linux kernel 2.6.16 .5

Linux kernel 2.6.16 .1

Linux kernel 2.6.16 .23

Linux kernel 2.6.16 -rc1

Linux kernel 2.6.16

Linux kernel 2.6.17

Linux kernel 2.6.17 .1

Linux kernel 2.6.17 -rc5

Linux kernel 2.6.2

Linux kernel 2.6.3

Linux kernel 2.6.4

Linux kernel 2.6.6 rc1

Linux kernel 2.6.6

Linux kernel 2.6.7

Linux kernel 2.6.8 rc2

Linux kernel 2.6.8 rc1

Linux kernel 2.6.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站