[kernel-sec-discuss] r913 - dsa-texts

dannf at alioth.debian.org dannf at alioth.debian.org
Wed Aug 15 23:40:45 UTC 2007


Author: dannf
Date: 2007-08-15 23:40:45 +0000 (Wed, 15 Aug 2007)
New Revision: 913

Added:
   dsa-texts/2.6.18.dfsg.1-13etch1
Log:
initial commit

Copied: dsa-texts/2.6.18.dfsg.1-13etch1 (from rev 911, dsa-texts/2.6.18.dfsg.1-12etch2)
===================================================================
--- dsa-texts/2.6.18.dfsg.1-13etch1	                        (rev 0)
+++ dsa-texts/2.6.18.dfsg.1-13etch1	2007-08-15 23:40:45 UTC (rev 913)
@@ -0,0 +1,494 @@
+--------------------------------------------------------------------------
+Debian Security Advisory DSA 1356-1                    security at debian.org
+http://www.debian.org/security/                               Dann Frazier
+August 15th, 2007                       http://www.debian.org/security/faq
+--------------------------------------------------------------------------
+
+Package        : linux-2.6
+Vulnerability  : several
+Problem-Type   : local/remote
+Debian-specific: no
+CVE ID         : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453 CVE-2007-2525
+                 CVE-2007-2876 CVE-2007-3513 CVE-2007-3642 CVE-2007-3848
+                 CVE-2007-3851
+                 
+Several local and remote vulnerabilities have been discovered in the Linux
+kernel that may lead to a denial of service or the execution of arbitrary
+code. The Common Vulnerabilities and Exposures project identifies the
+following problems:
+
+CVE-2007-1353
+
+    Ilja van Sprundel discovered that kernel memory could be leaked via the
+    Bluetooth setsockopt call due to an uninitialized stack buffer. This
+    could be used by local attackers to read the contents of sensitive kernel
+    memory.
+
+CVE-2007-2172
+
+    Thomas Graf reported a typo in the DECnet protocol handler that could
+    be used by a local attacker to overrun an array via crafted packets,
+    potentially resulting in a Denial of Service (system crash).
+    A similar issue exists in the IPV4 protocol handler and will be fixed
+    in a subsequent update.
+
+CVE-2007-2453
+
+    A couple of issues with random number generation were discovered.
+    Slightly less random numbers resulted from hashing a subset of the
+    available entropy. zero-entropy systems were seeded with the same
+    inputs at boot time, resulting in repeatable series of random numbers.
+
+CVE-2007-2525
+
+    Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
+    by releasing a socket before PPPIOCGCHAN is called upon it. This could
+    be used by a local user to DoS a system by consuming all available memory.
+
+CVE-2007-2876
+
+    Vilmos Nebehaj discovered a NULL pointer dereference condition in the
+    netfilter subsystem. This allows remote systems which communicate using
+    the SCTP protocol to crash a system by creating a connection with an
+    unknown chunk type.
+
+CVE-2007-3513
+
+    Oliver Neukum reported an issue in the usblcd driver which, by not
+    limiting the size of write buffers, permits local users with write access
+    to trigger a DoS by consuming all available memory.
+
+CVE-2007-3642
+
+    Zhongling Wen reported an issue in nf_conntrack_h323 where the lack of
+    range checking may lead to NULL pointer dereferences. Remote attackers
+    could exploit this to create a DoS condition (system crash).
+
+CVE-2007-3848
+
+    Wojciech Purczynski discovered that pdeath_signal was not being reset
+    properly under certain conditions which may allow local users to gain
+    privileges by sending arbitrary signals to suid binaries.
+
+CVE-2007-3851
+                 
+    Dave Airlie reported that Intel 965 and above chipsets have relocated
+    their batch buffer security bits. Local X server users may exploit this
+    to write user data to arbitrary physical memory addresses.
+
+These problems have been fixed in the stable distribution in version 
+2.6.18.dfsg.1-13etch1.
+
+The following matrix lists additional packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+                                 Debian 4.0 (etch)
+     fai-kernels                 1.17+etch4
+     user-mode-linux             2.6.18-1um-2etch3
+
+We recommend that you upgrade your kernel package immediately and reboot
+the machine. If you have built a custom kernel from the kernel source
+package, you will need to rebuild to take advantage of these fixes.
+
+Upgrade Instructions
+--------------------
+
+wget url
+        will fetch the file for you
+dpkg -i file.deb
+        will install the referenced file.
+
+If you are using the apt-get package manager, use the line for
+sources.list as given below:
+
+apt-get update
+        will update the internal database
+apt-get upgrade
+        will install corrected packages
+
+You may use an automated update by adding the resources from the
+footer to the proper configuration.
+
+
+Debian GNU/Linux 4.0 alias etch
+--------------------------------
+
+  Source archives:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.dsc
+      Size/MD5 checksum:     5672 ef2648e54c6ea1769b29ba191fc13083
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.diff.gz
+      Size/MD5 checksum:  5306139 589297d453d15848b5879cf22eed7d40
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
+      Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
+
+  Architecture independent components:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+      Size/MD5 checksum:  3585938 a94cd1247d3dc98378dd094b3b364044
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+      Size/MD5 checksum:  1081908 36d119bd92dbd35a8f83b191f74daf09
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+      Size/MD5 checksum:  1475708 0373ab2ac016f31d2591eab4de39e4d3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+      Size/MD5 checksum: 41417232 279c0d7b44a451169a118e0a2b0c4eeb
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch1_all.deb
+      Size/MD5 checksum:  3738202 e4cfce3e67d3a0f6aeb4fe1fb5706372
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
+      Size/MD5 checksum:    51094 b22167a8b2ab8d0cfb9eded0d0b8d8a0
+
+  Alpha architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:  3024210 ad1fc21ac8fcb76a0db86d25737c8a83
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:    50680 28ad3748b8d76abbb2e896f7ff190240
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:    50720 1f106b97c91e07921402b0a2174574c6
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:   263524 4ce1e83ad733aee9d36b075babc6f908
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:   263838 4c9ebe648f73818252ed3de79567219e
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:   262864 a3d6389b9224fcef726128f3a747a4f8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:  3048212 d86c3c8fac6533904b91592016e2afba
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum:   264300 15606dadab1e1bbb4d9234a8bfb09b5e
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum: 23485186 1978fddd39e8e7ce9ebc88efefd4ebe0
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum: 23464818 bdfd39761fd0bc68de001efb430895af
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum: 23838852 e9ae2b4f056d9b47832234d2aa6ec4d7
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
+      Size/MD5 checksum: 23528772 4f029181ad02c46f2ae2b34038b629e0
+
+  AMD64 architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:  3164562 5bef24546e02e53d0b866b68e57c8294
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:    50644 173c9d06298afe48e609cd08a5420737
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:    50668 61e625ce94855d474c0562819ae3b879
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:   270036 cd6f518453e0b75e3d4e17bc1fca62a3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:  3187796 2958630378a24cb3f16807e04fe17297
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:   269650 dbfd4c56547401e7b6a6460f41dd266b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:  3330944 996a5cba350ae0c9110f8ca72492bfc2
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:   271784 c1841e07342a73c9cf87058cc0ca943b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:  3353796 730dd7dd17cb532152463000f16459f0
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:   270068 363ff82948e473032eaa4fc37d2b9d6b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum: 16838550 dee2a96f0c89bc9b59b2febd42dc8bb1
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:  1647400 8f72b372c132b40f5c828d7d0a94bf62
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:  1679728 853224dc22a8fa38c8b4af6534886a77
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum: 15238676 d62ddc5e61a35e84529262c9101b0e93
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum: 15256142 8b0667dd7cb043b753ce3a9770058515
+    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:    50618 0da191c5dcd2406d079f9aab3b4ca0a3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
+      Size/MD5 checksum:    50632 46cd39c06556d9bc465099cddb3c7f3d
+
+  ARM architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:  3346806 bc6581484d2364ccba4bbdb275072ecb
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:    50652 976339e33b567d816811d561dc575cc8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:    50694 19473ef72c0109f1ce9dc9dfd4f3de3d
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:   225038 969f487c6c9d50fef7200e0a3ecb5c4b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:   226564 c5f03ec763dfb6b27d00f8f90e0ae9da
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:   232748 bb9606e416b2aa84c3cc8071ac2350d8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:   192126 cd01397be860265e013d55aa574c7347
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:   194764 e05a0715a2bf9cbac171217b22314b19
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:  7518754 018e9a847ff04f7fc3580f85bfc2abe1
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:  7869416 e4750e15d602443f08ba02c7e7c2a137
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:  8806748 7436ed2118660e9c7f4f4697ac5868c3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:  4558510 68d071f5a09c182509bea873aef02105
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb
+      Size/MD5 checksum:  4981066 6c261104c98cc528d6633f79274ad72a
+
+  HP Precision architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:  2964238 f6fd8c5dd6071370f953e496756851cf
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:    50642 8aca6d6bffa3b334b71b66332dd125ae
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:    50668 7dfc3cbdd0f0763008e0246015fe5c9f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:   188488 31502e1f9bdcc0a24d6a7762f6f4cbe8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:   189420 e6deaa2c4a398b59a40a732cb9018940
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:   189146 133d151b9aa064b61c90c0c9ce20656c
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum:   189834 c7ada740b1647894ceda503d4ee8399b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum: 10498710 5d3ee84cc71a57eabe1d0647f704ad3c
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum: 10940810 8e1de20ffcc7df26862544af83f78771
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum: 11344516 a6fe777a6d6296c1d95c81c25931102e
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb
+      Size/MD5 checksum: 11751450 e0c73577059ad7ee24893278e8bb580c
+
+  Intel IA-32 architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:  3164474 5581e6b60de382087f4e3cd05a326cd8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   277248 ff8b78d10cb79fc1c9258cd43a408499
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   275932 874d04ecd1f692d9781e2cb47c687ee6
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   276286 dbcc90161edc6a46b7a89a10b0fc22ff
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:    50640 34b3065eb0fdc3a02576c9ebdd2508d9
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:    50700 77d1ae15ad63b7e9675225a6ca7db47c
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   268294 a60191beaaf0d62099dbd1a20eaf6b75
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   275830 f9a83308d8ecd6eb36d6791b864116c5
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:  3050892 8283afde8651de38ff35c68ac9d34feb
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   273688 759941012b1848db94e34d6f1c57cfd6
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   273764 bc27c920b5a85c643d3f9a7fa3bb2f9f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:  3145220 f0cee6bc58f389ef78fc3cbcad757197
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   270550 b1aca209d3f63334b8512bd70e7fee04
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:  3167356 72a44aac33deb66d1eed41b37d9f6f84
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:   271130 cebd78501825a595f992a575371cd8b7
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16170152 7dbf8514bc38e86a6d6454593628a9a8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16319248 a099f9f04a33385dc29a7cc5ed743411
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16384438 83d05912745de976a2648295241f0b15
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16816198 1c14cd0e4867b12f05bea602a7940b11
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16449650 9c195ec1b9f2b5f2531017389234d817
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16358054 727d0f2e6e821a34c527c44946660653
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 16488812 1619800305c3c55e48f9b5484cd7ec39
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:  1296346 6f233c2b69738b9d577a4c1d7d9283a3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:  1323270 c3ba3e1299340fe9666746ada15cafe2
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 14258314 37215c1b602209320153136ddae5b53d
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum: 14272088 00cfea4d19109eff959c360f63b90c18
+    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:    50620 3d60ebbd894ac77ddaafaaba903083b8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
+      Size/MD5 checksum:    50636 9277c97ebb5c14fc93c5449c5e5a391c
+
+  Intel IA-64 architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum:  3078390 7c1dc7cf08fdce40fdb01acd14c6167b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum:    50644 4303c1255e6d4840b9ce34b8da158125
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum:    50662 5235fb30a8f35c91ea15335ee439a60d
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum:   251576 5b89eeb214501b0a1b6e2d2712763fe3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum:   251558 573aa9cc9fba9924a98a1b6ca786edfe
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum: 28008514 baaf3f87d60cb1d68c361cea849d3c27
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb
+      Size/MD5 checksum: 28178022 c6cb8de82903383b78c7a9646d7df7da
+
+  Big endian MIPS architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:  3346354 c0c5d438a80a114ffbe515104f44785f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:    50644 822db9efc5caba5bd3f96c2ffef90ce8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:    50692 9fbd9cb53ce75b25243adfb5568bd2f9
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:   146348 4a2ede92f7cba5e409a01504a5787786
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:   156600 b56c8fe624757cca08eafda9a7b62122
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:   160930 14710075883c5cb17ed1f4dfa854461f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:   179380 f61160dd2e459a70170e5ba8524aea36
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:   179154 aba921bcc75c80c0c96c727eac34afaf
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:  6090314 99e9641ce38b6d0530199ad566738d73
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:  8271518 6979492cd1b01cf3b76958211bfb3bdf
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum:  9037182 56824fbbc825d14d2fec62b2562f44ce
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum: 15636546 85bc62cca019e5d5c07374fe4ea05df8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb
+      Size/MD5 checksum: 15608670 233369e78b74fdca2143c971995440f5
+
+  Little endian MIPS architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:  3346628 a208480b2fa7bdd13559b4078d03cac9
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:    50648 20d1bf2c345a889720562597f9300152
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:    50712 31666ed837cac8aec136528616a7407f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:   146012 ec774ccba8d1783239b0f12cee90abe3
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:   152252 99657c9b655c5f1bded07e4a5394d132
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:   152340 0c0778fa59bda664f8cb4f0f1ba8f90b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:   174444 8927ed0b8d880d99fcc79c64ecc44c54
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:   179284 8b01ba01c4d2e0e4a1dbfd4acd5354ea
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:   179144 368da689abd47ca70aced24efec5b040
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:  6025698 a355ec38f440f7e08d0f22ce6184bcf8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:  5937952 2de36f1fdeb55373eb50fb77efe7f938
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:  5921402 006d6d3d34f2db5b21500cdc8914dc08
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum:  9857018 4246c3b15aae0df84b669381a8f1383e
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum: 15052960 317130eff4221493bf31349bb99d0eab
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb
+      Size/MD5 checksum: 15019204 a5c6e183ff53d3c8fd169f0d2bc17ebc
+
+  PowerPC architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:  3388916 6d6415c4241ea26786fd3a72899e266f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:    50652 f19e0ad61b5e91f685e920a58248c8e9
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:    50698 111c11da4f26a93122b76b6eac5b92c8
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   248366 7bafbd435e00ad6b647b347d84e1e0c1
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   225218 90e19db35ef618a7e3f476576de60d95
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   248400 3dd8373a35220a27423c3f4eadd32358
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   248712 8a0281e9b856372f4d01c8a0f4b02d72
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   242934 92f3fda2938f60fdf6f957f0659712ab
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:  3411216 b9070329bf0a6045896db2fc15f66f0a
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   248448 e108e05b4fe2239d4e95fb6598405fd6
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum:   249006 3908dfaf4f518192bd550ca5ac45476f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 16623606 b76fa67819092073c6bfc51904163278
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 15149270 502237df8e0f90e7ab95b28cbe7a5f8f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 16960668 69f13fe8bde671497363849f76636eda
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 18291108 9cc68d73b1bcf401176d1f93bd1dfeb1
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 16395670 fbab6e355aba9c29f63603d097855c5e
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 17006732 cca0573ca442e02ad6f153fcc059f734
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
+      Size/MD5 checksum: 18340518 3940b166f8b0464baa118c8557922edb
+
+  IBM S/390 architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:  2939624 fada85c4d5ec9cbdee803116fde561b1
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:    50642 9478b247c93b2ba8b405f93b525307ae
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:    50664 d694fdeff900e5b1ba575ad15bbd5310
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:   139294 02bcbe57d1b62129243c8cb4b7bb8d2d
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:   139538 69993d0e2867ed4efa5bb0e442d3d014
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:  2962698 36d89e72ac15117d15a3488878d205a4
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:   140274 5b8bacca256347a7ce02783651110e35
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:  5398576 b1054f70f0472fd020241b6af904438d
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:  1435060 daf41750946017171aad603b9218d0c4
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:  5613112 68d67210c4c6aa0ea54b1754df137d8e
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb
+      Size/MD5 checksum:  5659570 c6a2db3553a427cecf69d9f1258e9444
+
+  Sun Sparc architecture:
+
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:  3164578 902a8ff3089225278575251ba13f1f98
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:    50640 455bd9863c6f183ee28d15e7ba9ddc38
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:    50674 8416d5c20659923183729457854e139f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:   161886 f58a554b0de7e05c4727bff1e236a069
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:   191010 bad7bf07af89b1ba54ff559f99cf3d1b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:   191776 f059b7c75ea312f69758d02e6da4cd4f
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:  3186936 2a865cc6aed95cdc0ed3ebb20ec0a6d0
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:   192172 197b2cd91975cbda876bc0ac18244870
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum:  6406184 e0ce977a5c79906c4996f069672e272b
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum: 10351700 69bc68d296d9134f6df792fb745c9810
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum: 10610496 b40bc9a07de220a54a1489b22d1d60f4
+    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
+      Size/MD5 checksum: 10656362 91c6c66c24c7d5ca45c0e6eb5dcdcbba
+
+  These files will probably be moved into the stable distribution on
+  its next update.
+
+---------------------------------------------------------------------------------
+For apt-get: deb http://security.debian.org/ etch/updates main
+For dpkg-ftp: ftp://security.debian.org/debian-security dists/etch/updates/main
+Mailing list: debian-security-announce at lists.debian.org
+Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>




More information about the kernel-sec-discuss mailing list