lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080222205548.GA6392@ldl.fc.hp.com>
Date: Fri, 22 Feb 2008 13:55:49 -0700
From: dann frazier <dannf@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1503-1] New Linux kernel 2.4.27
	packages fix several issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1503                  security@...ian.org
http://www.debian.org/security/                           dann frazier
February 22, 2008                   http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : kernel-source-2.4.27 (2.4.27-10sarge6)
Vulnerability  : several
Problem-Type   : local/remote
Debian-specific: no
CVE ID         : CVE-2004-2731 CVE-2006-4814 CVE-2006-5753 CVE-2006-5823
                 CVE-2006-6053 CVE-2006-6054 CVE-2006-6106 CVE-2007-1353
                 CVE-2007-1592 CVE-2007-2172 CVE-2007-2525 CVE-2007-3848
                 CVE-2007-4308 CVE-2007-4311 CVE-2007-5093 CVE-2007-6063
                 CVE-2007-6151 CVE-2007-6206 CVE-2007-6694 CVE-2008-0007
                 
Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2004-2731

    infamous41md reported multiple integer overflows in the Sbus PROM
    driver that would allow for a DoS (Denial of Service) attack by a
    local user, and possibly the execution of arbitrary code.

CVE-2006-4814

    Doug Chapman discovered a potential local DoS (deadlock) in the mincore
    function caused by improper lock handling.

CVE-2006-5753

    Eric Sandeen provided a fix for a local memory corruption vulnerability
    resulting from a misinterpretation of return values when operating on
    inodes which have been marked bad.

CVE-2006-5823

    LMH reported a potential local DoS which could be exploited by a malicious
    user with the privileges to mount and read a corrupted cramfs filesystem.

CVE-2006-6053

    LMH reported a potential local DoS which could be exploited by a malicious
    user with the privileges to mount and read a corrupted ext3 filesystem.

CVE-2006-6054

    LMH reported a potential local DoS which could be exploited by a malicious
    user with the privileges to mount and read a corrupted ext2 filesystem.

CVE-2006-6106

    Marcel Holtman discovered multiple buffer overflows in the Bluetooth
    subsystem which can be used to trigger a remote DoS (crash) and potentially
    execute arbitray code.

CVE-2007-1353

    Ilja van Sprundel discovered that kernel memory could be leaked via the
    Bluetooth setsockopt call due to an uninitialized stack buffer. This
    could be used by local attackers to read the contents of sensitive kernel
    memory.

CVE-2007-1592

    Masayuki Nakagawa discovered that flow labels were inadvertently
    being shared between listening sockets and child sockets. This defect
    can be exploited by local users to cause a DoS (Oops).

CVE-2007-2172

    Thomas Graf reported a typo in the DECnet protocol handler that could
    be used by a local attacker to overrun an array via crafted packets,
    potentially resulting in a Denial of Service (system crash).
    A similar issue exists in the IPV4 protocol handler and will be fixed
    in a subsequent update.

CVE-2007-2525

    Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
    by releasing a socket before PPPIOCGCHAN is called upon it. This could
    be used by a local user to DoS a system by consuming all available memory.

CVE-2007-3848

    Wojciech Purczynski discovered that pdeath_signal was not being reset
    properly under certain conditions which may allow local users to gain
    privileges by sending arbitrary signals to suid binaries.

CVE-2007-4308

    Alan Cox reported an issue in the aacraid driver that allows unprivileged
    local users to make ioctl calls which should be restricted to admin
    privileges.

CVE-2007-4311

    PaX team discovered an issue in the random driver where a defect in the
    reseeding code leads to a reduction in entropy.

CVE-2007-5093

    Alex Smith discovered an issue with the pwc driver for certain webcam
    devices. If the device is removed while a userspace application has it
    open, the driver will wait for userspace to close the device, resulting
    in a blocked USB subsystem. This issue is of low security impact as
    it requires the attacker to either have physical access to the system
    or to convince a user with local access to remove the device on their
    behalf.
    
CVE-2007-6063

    Venustech AD-LAB discovered a a buffer overflow in the isdn ioctl
    handling, exploitable by a local user.

CVE-2007-6151

    ADLAB discovered a possible memory overrun in the ISDN subsystem that
    may permit a local user to overwrite kernel memory leading by issuing
    ioctls with unterminated data.

CVE-2007-6206

    Blake Frantz discovered that when a core file owned by a non-root user
    exists, and a root-owned process dumps core over it, the core file
    retains its original ownership. This could be used by a local user to
    gain access to sensitive information.

CVE-2007-6694

    Cyrill Gorcunov reported a NULL pointer dereference in code specific
    to the CHRP PowerPC platforms. Local users could exploit this issue
    to achieve a Denial of Service (DoS).

CVE-2008-0007

    Nick Piggin of SuSE discovered a number of issues in subsystems which
    register a fault handler for memory mapped areas. This issue can be
    exploited by local users to achieve a Denial of Service (DoS) and possibly
    execute arbitrary code.

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

                                 Debian 3.1 (sarge)
     alsa-modules-i386           1.0.8+2sarge2
     kernel-image-2.4.27-arm     2.4.27-2sarge6
     kernel-image-2.4.27-m68k    2.4.27-3sarge6
     kernel-image-speakup-i386   2.4.27-1.1sarge5
     kernel-image-2.4.27-alpha   2.4.27-10sarge6
     kernel-image-2.4.27-s390    2.4.27-2sarge6
     kernel-image-2.4.27-sparc   2.4.27-9sarge6
     kernel-image-2.4.27-i386    2.4.27-10sarge6
     kernel-image-2.4.27-ia64    2.4.27-10sarge6
     kernel-patch-2.4.27-mips    2.4.27-10.sarge4.040815-3
     kernel-patch-powerpc-2.4.27 2.4.27-10sarge6
     kernel-latest-2.4-alpha     101sarge3
     kernel-latest-2.4-i386      101sarge2
     kernel-latest-2.4-s390      2.4.27-1sarge2
     kernel-latest-2.4-sparc     42sarge3
     i2c                         1:2.9.1-1sarge2
     lm-sensors                  1:2.9.1-1sarge4
     mindi-kernel                2.4.27-2sarge5
     pcmcia-modules-2.4.27-i386  3.2.5+2sarge2
     hostap-modules-i386         1:0.3.7-1sarge3
     systemimager                3.2.3-6sarge5

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

Note that this update changes various package names due to ABI changes.
You must therefore have the corresponding upgrade-assist metapackage(s)
installed for your upgrades to automatically take place. These packages
have names with the prefix 'kernel-image-2.4-'.

For a full list of the metapackages available for your architecture, run
the following command on the target Debian 3.1 system:
        apt-cache search kernel-image-2.4-

Any 3rd party modules that have been built and installed for your system
will need to be rebuilt and installed for compatability with the new ABI.

Debian 3.1 (oldstable)
- ----------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge2.dsc
    Size/MD5 checksum:     1345 4686200ea3a9e29560dffde21e35d247
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.dsc
    Size/MD5 checksum:      831 8562d7488f7cb95d205bf76fe110f6c1
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge6.dsc
    Size/MD5 checksum:      876 1a7aac50d25494a39a12da08d10c9139
  http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge2.dsc
    Size/MD5 checksum:      857 2f49354f5660d561153dcdb283a04c60
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge2.tar.gz
    Size/MD5 checksum:     2651 6aff151a16ad2211e6f118efdd2fca6d
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6.diff.gz
    Size/MD5 checksum:   783802 57cbeb3a0d58f27c5491ea92ae8760dc
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge5.dsc
    Size/MD5 checksum:     1027 7152d7aa17c4632a0e9ef450e92d3850
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge6.tar.gz
    Size/MD5 checksum:    12009 a9d2d3f315b9e2ddcb835ac35b993e82
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz
    Size/MD5 checksum:   870765 f5af615e39441d95471bdb72a3f01709
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge5.tar.gz
    Size/MD5 checksum: 15980836 2ed3cdd33958dbbb79acad51633fed0e
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge3.dsc
    Size/MD5 checksum:      685 3684714d888d9897193781152b1bb2fa
  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5.diff.gz
    Size/MD5 checksum:     6520 78dd7ab4110563f7cfa41546b7afda57
  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge5.tar.gz
    Size/MD5 checksum:    20360 f80c884ab46b2e419ca401ed21c7d698
  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
    Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge6.dsc
    Size/MD5 checksum:     1130 67e25655311032dc532f331bfaad529e
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge2.tar.gz
    Size/MD5 checksum:   105479 c2b1bb5c024aec2c4938866fda42a536
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge3.dsc
    Size/MD5 checksum:      846 e49c48cbef5fce4aac4ca3bfd9b97518
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-3.dsc
    Size/MD5 checksum:     1050 2930e25b0b2978c257ea94b7c0f385f4
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge3.tar.gz
    Size/MD5 checksum:     2281 d72e0b2a828d4db9076142f8092a83b0
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge2.dsc
    Size/MD5 checksum:      825 1b3ccb11081c743293e515f0864f76f7
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4.diff.gz
    Size/MD5 checksum:    33474 f96bd95e933f2ad4184a64141a11a375
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge6.tar.gz
    Size/MD5 checksum:  1466506 4077db3abe1299270d37ab358e8f5443
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge6.dsc
    Size/MD5 checksum:     1143 1434f7f54c70afe26043692c12537e57
  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5.dsc
    Size/MD5 checksum:      750 2ae692be75bc5bd0ae47105ec3b903e4
  http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz
    Size/MD5 checksum:   142961 eb3d1df2d3b46f199af2485db612c76d
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4.dsc
    Size/MD5 checksum:     1089 5f669ca85a85782c1040d45c351d965e
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge2.dsc
    Size/MD5 checksum:      663 afa6f7006f0e5f28f08f81ab0c0cba7b
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge3.tar.gz
    Size/MD5 checksum:     1987 e4c3061eb307723a40cd3bbc0e28fcc4
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge3.dsc
    Size/MD5 checksum:     1092 1682bf8794992d2bd327227cbe21fb77
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge6.tar.gz
    Size/MD5 checksum:   101379 c5fde5cda4bc40b613e3eb8389464e00
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge6.tar.gz
    Size/MD5 checksum:    57143 4e1252ccc54094413af132b1e509c78a
  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge5.dsc
    Size/MD5 checksum:      732 c78ef81ca5b402222e7137d1a8052748
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-3.tar.gz
    Size/MD5 checksum:   310504 a95d863d77233921e79185c3dac62f94
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge2.tar.gz
    Size/MD5 checksum:     1629 631165e8731c66fc60e875371c649a03
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6.dsc
    Size/MD5 checksum:      900 cacb4fcef0ee57a53ba0efbfcae9d3cf
  http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge2.diff.gz
    Size/MD5 checksum:     9671 afae6ba433c81376fc42fb5de1750169
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
    Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge6.tar.gz
    Size/MD5 checksum:    14303 50eac91503e4d951e8c555470526c56d
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge6.dsc
    Size/MD5 checksum:      839 09f407768d0a85fa121f68595bf6d9da
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge6.dsc
    Size/MD5 checksum:     1582 d905f8b5191e92587b2694776bfd2162
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.tar.gz
    Size/MD5 checksum:    33837 94e6565cd478f866a0f079b8d5de5b1e
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge6.dsc
    Size/MD5 checksum:     1074 872a5a07e8a19c0544ca02dccc59730c
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge6.tar.gz
    Size/MD5 checksum:    37326 dcdb061379c1e912712be472ef423a2e
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge6.dsc
    Size/MD5 checksum:      832 e877d255836a119568f2b811484509a8
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge3.tar.gz
    Size/MD5 checksum:     2328 c3f3f0a00cd017334a3d045142f11b6f
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge6.tar.gz
    Size/MD5 checksum:    26268 6401b539084d362190963c16487ac91d

Architecture independent packages:

  http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge2_all.deb
    Size/MD5 checksum:   159972 52f3d8c35dc66b3806fdcbd5911172ef
  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge5_all.deb
    Size/MD5 checksum:  2424128 6bc37ebffcc8af7d71edabbc29edff9e
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:   119874 6320eef7e64b58239bbf976787178a86
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge6_all.deb
    Size/MD5 checksum:   752214 ea5d65d5f1c650e0b9d7db4373df65b4
  http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge4_all.deb
    Size/MD5 checksum:   304594 17171ede79299ea662c0eb92c09d7b89
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge6_all.deb
    Size/MD5 checksum:    28966 2f946b48d7784fd66e1833972999b091
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6_all.deb
    Size/MD5 checksum: 31485082 d8e3315c288f5550386686d4f56b945b
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:    32790 6e1a1822035ee3eacd9b64adc1e9af57
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:    18512 8f686699219008d35136f3eda8846894
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:  9548918 f2d22e050aec4e3cdef89fa36d0a1acd
  http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge2_all.deb
    Size/MD5 checksum:   106162 c020f32c2b9c0bb3f60a8d7aa536202b
  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge6_all.deb
    Size/MD5 checksum:  3590114 333eed9fc4f7de67d8d348b4437e212d
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:   633864 aa02fdc51feb16ab51aa2d0b864b5033
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge4_all.deb
    Size/MD5 checksum:   945778 b5cd269a473566b2eab20477bb5ccc75
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:  4762284 0e4f9547acf07ac7eac578acd7062289
  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge5_all.deb
    Size/MD5 checksum:    32908 c38aa76390664cd61cd39fcafdc061e3

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge3_alpha.deb
    Size/MD5 checksum:     2004 b85b43e7e593767ac3c2e9759800441c
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb
    Size/MD5 checksum:   275104 ac124d1aef568fc04144cfde499ba818
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb
    Size/MD5 checksum: 16991940 3644d797f1b4f4fe17810fc128ecfef2
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-4_2.4.27-10sarge6_alpha.deb
    Size/MD5 checksum:     9536 818db9ca2e9411bd9395956f8a466850
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_alpha.deb
    Size/MD5 checksum:    21868 b3b80288bf4fa33ee8173b71396b1ed8
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge3_alpha.deb
    Size/MD5 checksum:     2008 44d187a24b738878ec0624a096fdb5f4
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb
    Size/MD5 checksum:   277016 f7a91380e5f5a795a4eccfcff273a2b1
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge3_alpha.deb
    Size/MD5 checksum:     2016 55ea69109097ddcc254609df82c98e91
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge3_alpha.deb
    Size/MD5 checksum:     2010 5095855832ed1006e4d11c2d9e0325b7
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb
    Size/MD5 checksum: 16537164 250c932f3b2048587f8dc8e41ab26926
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4_2.4.27-10sarge6_alpha.deb
    Size/MD5 checksum:  4649894 e46f99205e2b499dabf3e13b6778d776

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_amd64.deb
    Size/MD5 checksum:    18612 89c5c3f01d1715252ac3ec8ba363b9de

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:  1698658 af8a1eb0a1eab58c562f639343ee5101
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:  1062484 fdac028111ef3d2a5bf226e21d74b394
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:   484774 106d72fdc046ad8ab48bf45aff7319da
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:  3168914 a7539fe4daefea79532eda6846e92382
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:  4728038 305dbb3ab1d46dbeac5aeb1db685853e
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_arm.deb
    Size/MD5 checksum:    20346 1976571746db1bdc1ce05b0638cde4c7
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:  7379444 1d96d07f4b98258c48e37a3ce3fb9816
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge6_arm.deb
    Size/MD5 checksum:  3693056 ec852f94b459dec72e9e776d7b7babdf

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_hppa.deb
    Size/MD5 checksum:    20722 f9b295e020b4898e0cee48fa9d1ab90e

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge2_i386.deb
    Size/MD5 checksum:     2190 de7c785f29cfac9758d90c48c8eb5bca
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-386_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77904 8e0633c48d4a196eb7d750f75bd7068a
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   301002 3aab4d4883d87b229d48fac30d41e603
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   296070 d790eb36fc3213aefb7deba17a3cbeeb
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge2_i386.deb
    Size/MD5 checksum:     2250 4d72f7bd505333cee3e3e6fe24b35cfc
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k7_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77702 fec475b02fa1569acc7a2fd254736c89
  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge5_i386.deb
    Size/MD5 checksum: 11314694 5d9e7fbdcfde268a978f4c57bac8a445
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge2_i386.deb
    Size/MD5 checksum:     2210 94453df286d5f4e53129c9ad21c48269
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:   165342 2d7a7d95cd8659cbae4a293ed5247443
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge2_i386.deb
    Size/MD5 checksum:     2258 e07b801edb75bff62ff274577b74e41f
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_i386.deb
    Size/MD5 checksum:    17980 2811fbff5ff6904b4100d713b48ccffc
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-386_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   301320 9017891e4c79068047e4af5cb929c31c
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-586tsc_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   477780 65991feae9a3464324fb4fd9a380ef00
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k6_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33488 b11e22c02586f81d1ce395ae1244428e
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 12439378 fbc7f2c6e8a05225049e8cc5ff42fc32
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge2_i386.deb
    Size/MD5 checksum:     2232 ca5ab5706cf7092c57853b73611ccf37
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-686_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 12357440 3892ecb2b0fb49a3ade013e27485320d
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k6_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   477686 7b9b7b5442441dc35b0d17f785dfce87
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-386_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33496 dc6d281fab6c1ab610e419758fd7b895
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge2_i386.deb
    Size/MD5 checksum:     2290 3656872aeedf815c3fb157e27a35aeed
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge2_i386.deb
    Size/MD5 checksum:     2200 99dc53e529fe3780b87ebea56bc3a9e2
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-686-smp_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33504 4683e862b99aee94cce49c7e24f4ca8d
  http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    77984 62558920315cbde876f88380f87a577d
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   301974 e32d1efb04c53424e0b8760e155e807c
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:  1857996 3727b12f2acaa3429b9f845c5fafa4b2
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge2_i386.deb
    Size/MD5 checksum:     2208 ecaf8a85eeab65f53b7cfc369e872741
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge2_i386.deb
    Size/MD5 checksum:     2180 d493e7439c2ac668aa8af8e300476a32
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge2_i386.deb
    Size/MD5 checksum:     2236 9899de5f907ce3bf505230f57e8e977f
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge2_i386.deb
    Size/MD5 checksum:     2296 cf0ed26b54117f21c940785dd5cd6361
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge2_i386.deb
    Size/MD5 checksum:     2200 8b295e8d54d56803114aca936edb9b3b
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k7-smp_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77762 7cd84fb3f7ccac997edf9ad814f596fc
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-686-smp_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77702 c33cd973e0b5f4426e1ff15c2b07bb93
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-686_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77634 8fd76652c4e0c63f65a06a596306f7e2
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge2_i386.deb
    Size/MD5 checksum:     2232 56e34da6218d5a9f5c495dbfa5b55234
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686-smp_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:   169666 5ab7867f5d9fa479e8a8f96cd6fa9fc8
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k7_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2458 fde4680c9802476653d87385f7553110
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge2_i386.deb
    Size/MD5 checksum:     2320 7e9d9c4d9e27630f3177f0ed33445958
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k6_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77642 de16e1b5ef4844c9b3619c6d0866a06c
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   307908 3a4cfc236fd895b79aa34a61aa25f4ea
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-586tsc_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2452 448ea77ae78b84b31074c06310abff2d
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-686-smp_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2466 630fcf555d96bbefe36adc031b1590dd
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   303850 d3105a688746ddd36d618018e9b53d1a
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   296314 a124cb2d7c7cc1a0462f34f40f341eef
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge2_i386.deb
    Size/MD5 checksum:     2278 5747a8a13621d34006e02e12ddecfdf5
  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge5_i386.deb
    Size/MD5 checksum:  4845086 75f294bc16c692a9d047cacfab9e843b
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-686_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33492 869083538e79481e56094549c5321cd0
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-386_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2446 d0f3f731301d12a7e83e0adc5e6faab5
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 12107272 6b1b8f925a1ff13b140f061215f47e09
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:   163754 ac42725375d4e828b4220d84f7f92ef7
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 12700924 759c414f04d4765e26c2b40957fc9ab4
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7-smp_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:   168080 6dbbcfbcef54fcef4106675d84bf75c1
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k7_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   477716 568d8b1052dbaff75b1d08e75b503dc9
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   301394 09804682d0b2db2150fab0a9bd95d163
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k6_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2462 1f0c32839c6fac5010d7a37bd29ac335
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-386_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:   147744 f4e889628f1479ca845848c374ba94d4
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge2_i386.deb
    Size/MD5 checksum:     2214 cceb0bf335f590d45b56060150be29e6
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k7-smp_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   484410 1b0e0136ac477ad58a991da10fef9275
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-686_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   302266 db4c30615a7cbdd1dc4e81b23b5e9a03
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-686_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   477742 b5fcc0041e57a89f2497a94934ab051f
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k7-smp_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33500 84fe5e6f5efe32f98d65732bbfe658ab
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-686_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   302150 0acd56708c0e9b1eb13ed65c301eb4e5
  http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    94012 2f7dd855a2776ace2161f61c9da880d4
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge2_i386.deb
    Size/MD5 checksum:     2218 6c564fa8fbe8eb3fed7547f363a5f3d3
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   302272 00ce79f3215cf690cd6f9a5d588fb46a
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 11725582 1a891346b963cea2591e0c2a2b40d418
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge2_i386.deb
    Size/MD5 checksum:     2228 e49a7f6a1ebf9217ca427fe98bef9ef5
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge2_i386.deb
    Size/MD5 checksum:     2212 c596e89ceb9694a47531542a81618fe8
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-4_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:    11964 5eaca507dc75c7dd8a5fea8a98adae17
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge2_i386.deb
    Size/MD5 checksum:     2192 ed4d6c14605c790b4b1514479cf2a4dc
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-686_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2454 51c30ec77e9345f6eb930a2684cc72f9
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k7_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33488 b83277fd8366c6120159be2d61c219cc
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-386_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   271418 0ece32ae57e8bc07909d472a27f75fad
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-586tsc_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    33506 b8318c2a64dfc2ed3a6997c958d2d4a8
  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5_i386.deb
    Size/MD5 checksum:  7773920 5ce6990c1c05480e64d479e63e8e573c
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   290140 ac3904823f38ee87f5d474b97989f1b7
  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-586tsc_2.9.1-1sarge2_i386.deb
    Size/MD5 checksum:    77644 e74884dab42407313589891ff9bab2ec
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-686-smp_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   484382 3ce4020ba4761da02bf838277169b514
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge2_i386.deb
    Size/MD5 checksum:     2274 a0ae0ea68ab8e0ad0b5c7ce84c648205
  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:   474474 1e8df851476f1d44b88888c9c67ea104
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-386_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 11052808 11a2d541ae4be60fc4ca0b012e040731
  http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge4_i386.deb
    Size/MD5 checksum:    56474 1f0f3fa67108dbde771d44446870feb1
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum:   303960 a0124d96976fdb5295d88e4452c3e482
  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k7-smp_0.3.7-1sarge3_i386.deb
    Size/MD5 checksum:     2466 b429be79430479aa6195e9be4df2df32
  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-386_3.2.5+2sarge2_i386.deb
    Size/MD5 checksum:   477778 b11e7c242050e16293ad1163f60770cb
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
    Size/MD5 checksum: 12040558 85ecbc317471b19622aa4c881787ccc4

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:     8784 90ee1b2e9043eb5c304e341e4341f307
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-mckinley-smp_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum: 16989836 ac671a15b2e59ab7e740fba0a275fdeb
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-itanium_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:   244176 e992f7a9972a853416b9d661b9b1ed27
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-mckinley_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum: 16635868 a9d4e077e6988de487f454462be71b29
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-itanium_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum: 16682160 4a0aad4af20efe7b377632b2fa1ecac7
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-mckinley_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:   244174 97772e1967c86e1049a31bc3945d55bc
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:     8762 1798dbe17258645061927e62084de5eb
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_ia64.deb
    Size/MD5 checksum:    23596 0809bc03e9bbed87e20c1cd7a1775e57
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-itanium-smp_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:   245076 794bce10f1d65a28defc12609330a563
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:     8774 c8b8a58a500877b95d05baca618b177c
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-mckinley-smp_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:   245194 d697c585822843bf50471b6e8d21242e
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-itanium-smp_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum: 17044112 c6b9372d496ca07bc3b67be07ebba31b
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:     8744 d80a7c62442813fb1e25bfee7f1f48b7
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:  4762160 59ddcd5f8c89ceae7140b501cf215fa8
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-4_2.4.27-10sarge6_ia64.deb
    Size/MD5 checksum:     8980 811a0f52aaf2699fcf5ce0b1f1a0bdbd

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2636312 ebf015a5cde926e2203d59ca336859e7
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2476770 5876a64c1242781d5f15351b3fe8f180
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2395372 017278dac5baccad9a4b779d1863bf0f
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2323460 164b52f450e86d51b99bd8647fefed2d
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2394638 73a3bbff4db6f767123d09be3656f6ff
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_m68k.deb
    Size/MD5 checksum:    17720 5a457bcf29fec4d35faecb504fff648a
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2543642 334a1c3125131e8844fb5de91fff3dd9
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge6_m68k.deb
    Size/MD5 checksum:  2260822 f5528d8ff99980a0f9bf3c8e8fc9e06c

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-3_mips.deb
    Size/MD5 checksum:  3879754 69d856bdbd22525f9e04ddf072189f67
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-3_mips.deb
    Size/MD5 checksum:  4763440 587a59f384c23f18d6d9cfae96ebec35
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-3_mips.deb
    Size/MD5 checksum:  7223008 717e19d7db9d95429064ed8bc71410fe
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_mips.deb
    Size/MD5 checksum:    21544 8b2e659f7e486d086a876157faac6af2
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-3_mips.deb
    Size/MD5 checksum:  3878278 70aab4ac78bbbaf2efb8ab726df4ba00

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  2144874 50c5ff9db6a00ba939f7b7eb9a55814c
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  4112030 89122df58404e5d46f0a94f160066077
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  4756972 b8024d146f7f13bded7a6424ddfa4135
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  4681486 f4fb5fab0de0a25fc7884c1c2f2f7340
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:    21876 4ab08ad75e84cc2be8b05b9e4ba5e4ef
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  3002730 79d768298894c6534408fa4867ab5b14
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  3042270 6a1ce29b2ce437516e64def1738c370f
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-3_mipsel.deb
    Size/MD5 checksum:  7049768 2ceaae0ecc0f1feb753bdad506280185

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_powerpc.deb
    Size/MD5 checksum:    20340 7f20372a9ab62ca36586defd15b0a5ee
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum: 12763130 f7a7340904b21ed0a5486174ae810052
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum: 13795002 826cb8d8fa3d3c3cab66f89df073deeb
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:  1822940 205748952ae7948db55771e71ac21f56
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum: 13490792 4f0010db40e43f778ce570e95a06551f
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:    12268 d5b7af76b08c231639d192940e81a43e
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:    12344 d068007806c2e699271c71508fc1e84b
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:  4874608 8707c0663aa5822a73d16352907c95eb
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:   145224 7aaa0cf1c764ec0b8924787e61b638d4
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:  4767046 31d52974cc78bd5a3609a21da97971d3
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:    69216 29e20e7d40917be81aa249d8bf88194f
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:  2505832 7a648cfd329f18cd56f758c5365a3c8c
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:  4758074 63ed1a37308075d0b9c85dacb3025f87
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:   158946 ab63071c1853718aecce65cd3a33e1a2
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:   145044 a36ed8999258cfb8519c7b46a22e0e17
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:   158876 436532d564b7c34fe9ff134c44b28ac2
  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge6_powerpc.deb
    Size/MD5 checksum:   159174 4562756f69ef7a3c639334b3dece3835

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390-tape_2.4.27-2sarge6_s390.deb
    Size/MD5 checksum:   997526 9d7687e5a7d1d6930f9b12c8dbd2da86
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390x_2.4.27-2sarge6_s390.deb
    Size/MD5 checksum:  2977638 d0e71d007359ea5fd412814b6307e05b
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-4_2.4.27-2sarge6_s390.deb
    Size/MD5 checksum:  4653304 1ef9845750b94c5034c83c9fbca61680
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge2_s390.deb
    Size/MD5 checksum:     1916 5f3a222f65f28cc02c3dac36d9fae589
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge2_s390.deb
    Size/MD5 checksum:     1904 e82185af5c4ffc366c91a62c3710b0f7
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_s390.deb
    Size/MD5 checksum:    20724 35eee44d510c23faa0d5980c8e042eed
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390_2.4.27-2sarge6_s390.deb
    Size/MD5 checksum:  2785758 f0ee3b3b6eb3ff47a5ab1c8bff6541f5
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge2_s390.deb
    Size/MD5 checksum:     1902 e50783f20196403fdb201296faa5f955

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge3_sparc.deb
    Size/MD5 checksum:     2224 3640903c50cf3f5ac3ca07e4f1a23e4c
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge3_sparc.deb
    Size/MD5 checksum:     2228 e25173a6212f5788a1eee7272033d92e
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge3_sparc.deb
    Size/MD5 checksum:     2208 2245a85962621b06eab854d81f5e2bd9
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge3_sparc.deb
    Size/MD5 checksum:     2210 c67bc9270fa69033579ded9a949b0c40
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc32-smp_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:  3796458 c3c25c364e5c6c8eaf5fc73c95d53095
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc32_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:   166596 ee5ba57e8ee80b5e7aedd28223db597f
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc64_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:   204932 f8d2bd0fa36e751487006104cad3edc8
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc64-smp_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:   206334 a659ec6ca6d0fbd1514c5423bac879e9
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:  2063174 5f91e658e46a6d7b7bdf184bc51d5868
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge3_sparc.deb
    Size/MD5 checksum:     2238 59514eec80d5fdf2e92cb943c50eb9b9
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc32-smp_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:   168392 a0c16b5ed34ca2a6f7b2ed8bdab19f84
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc32_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:  3607258 a5c1e2b59cb0c343a22ea70a1c125692
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge3_sparc.deb
    Size/MD5 checksum:     2238 b603643edb3cdd828155317d85cc46ef
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge3_sparc.deb
    Size/MD5 checksum:     2228 aac7dfd77156b6b90ca18fc8c1cff974
  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_sparc.deb
    Size/MD5 checksum:    19570 151b78bcb24f03464721cd886ccd9a85
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-4_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:    12010 a1c148d768477fc35842fdd0250869d6
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc64_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:  6390868 95135f6d77474f138d24322ccb7d505f
  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge3_sparc.deb
    Size/MD5 checksum:     2232 746057a5e29dbdb064bcf4b772d7bf99
  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc64-smp_2.4.27-9sarge6_sparc.deb
    Size/MD5 checksum:  6555152 1df415fa9711c74f3c344271bf8ecf0d


  These files will probably be moved into the oldstable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHvzaMhuANDBmkLRkRAstaAJ0VEtoaVsDq1deZD5xNQ0BWG1AoBwCePl3R
KmsrjYiZNJIYH5XYb2lv/Fs=
=DTWZ
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ