[kernel-sec-discuss] r1146 - dsa-texts

dannf at alioth.debian.org dannf at alioth.debian.org
Fri Feb 22 22:11:45 UTC 2008


Author: dannf
Date: 2008-02-22 22:11:44 +0000 (Fri, 22 Feb 2008)
New Revision: 1146

Added:
   dsa-texts/2.6.8-17sarge1
Modified:
   dsa-texts/2.4.27-10sarge6
Log:
add new dsa texts

Modified: dsa-texts/2.4.27-10sarge6
===================================================================
--- dsa-texts/2.4.27-10sarge6	2008-02-22 22:11:20 UTC (rev 1145)
+++ dsa-texts/2.4.27-10sarge6	2008-02-22 22:11:44 UTC (rev 1146)
@@ -1,12 +1,10 @@
-Subject: New Linux kernel 2.4.27 packages fix several issues
+------------------------------------------------------------------------
+Debian Security Advisory DSA-1503                  security at debian.org
+http://www.debian.org/security/                           dann frazier
+February 22, 2008                   http://www.debian.org/security/faq
+------------------------------------------------------------------------
 
---------------------------------------------------------------------------
-Debian Security Advisory DSA XXX-1                     security at debian.org
-http://www.debian.org/security/                               Dann Frazier
-XXXXX 8th, 2005                         http://www.debian.org/security/faq
---------------------------------------------------------------------------
-
-Package        : kernel-source-2.4.27
+Package        : kernel-source-2.4.27 (2.4.27-10sarge6)
 Vulnerability  : several
 Problem-Type   : local/remote
 Debian-specific: no
@@ -144,30 +142,31 @@
     exploited by local users to achieve a Denial of Service (DoS) and possibly
     execute arbitrary code.
 
-The following matrix explains which kernel version for which architecture
-fix the problems mentioned above:
-
-                                 Debian 3.1 (sarge)
-     Source                      2.4.27-10sarge6
-     Alpha architecture          2.4.27-10sarge6
-     ARM architecture            2.4.27-2sarge6
-     Intel IA-32 architecture    2.4.27-10sarge6
-     Intel IA-64 architecture    2.4.27-10sarge6
-     Motorola 680x0 architecture 2.4.27-3sarge6
-     Big endian MIPS             2.4.27-10.sarge4.040815-3
-     Little endian MIPS          2.4.27-10.sarge4.040815-3
-     PowerPC architecture        2.4.27-10sarge6
-     IBM S/390 architecture      2.4.27-2sarge6
-     Sun Sparc architecture      2.4.27-9sarge6
-
 The following matrix lists additional packages that were rebuilt for
 compatibility with or to take advantage of this update:
 
                                  Debian 3.1 (sarge)
-     fai-kernels                 XXX
-     kernel-image-2.4.27-speakup XXX
-     mindi-kernel                XXX
-     systemimager                XXX
+     alsa-modules-i386           1.0.8+2sarge2
+     kernel-image-2.4.27-arm     2.4.27-2sarge6
+     kernel-image-2.4.27-m68k    2.4.27-3sarge6
+     kernel-image-speakup-i386   2.4.27-1.1sarge5
+     kernel-image-2.4.27-alpha   2.4.27-10sarge6
+     kernel-image-2.4.27-s390    2.4.27-2sarge6
+     kernel-image-2.4.27-sparc   2.4.27-9sarge6
+     kernel-image-2.4.27-i386    2.4.27-10sarge6
+     kernel-image-2.4.27-ia64    2.4.27-10sarge6
+     kernel-patch-2.4.27-mips    2.4.27-10.sarge4.040815-3
+     kernel-patch-powerpc-2.4.27 2.4.27-10sarge6
+     kernel-latest-2.4-alpha     101sarge3
+     kernel-latest-2.4-i386      101sarge2
+     kernel-latest-2.4-s390      2.4.27-1sarge2
+     kernel-latest-2.4-sparc     42sarge3
+     i2c                         1:2.9.1-1sarge2
+     lm-sensors                  1:2.9.1-1sarge4
+     mindi-kernel                2.4.27-2sarge5
+     pcmcia-modules-2.4.27-i386  3.2.5+2sarge2
+     hostap-modules-i386         1:0.3.7-1sarge3
+     systemimager                3.2.3-6sarge5
 
 We recommend that you upgrade your kernel package immediately and reboot
 the machine. If you have built a custom kernel from the kernel source
@@ -189,14 +188,563 @@
 apt-get upgrade
         will install corrected packages
 
-You may use an automated update by adding the resources from the
-footer to the proper configuration.
+Note that this update changes various package names due to ABI changes.
+You must therefore have the corresponding upgrade-assist metapackage(s)
+installed for your upgrades to automatically take place. These packages
+have names with the prefix 'kernel-image-2.4-'.
 
+For a full list of the metapackages available for your architecture, run
+the following command on the target Debian 3.1 system:
+        apt-cache search kernel-image-2.4-
 
-Debian GNU/Linux 3.1 alias sarge
---------------------------------
+Any 3rd party modules that have been built and installed for your system
+will need to be rebuilt and installed for compatability with the new ABI.
 
-  These files will probably be moved into the stable distribution on
+Debian 3.1 (oldstable)
+----------------------
+
+Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.
+
+Source archives:
+
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge2.dsc
+    Size/MD5 checksum:     1345 4686200ea3a9e29560dffde21e35d247
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.dsc
+    Size/MD5 checksum:      831 8562d7488f7cb95d205bf76fe110f6c1
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge6.dsc
+    Size/MD5 checksum:      876 1a7aac50d25494a39a12da08d10c9139
+  http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge2.dsc
+    Size/MD5 checksum:      857 2f49354f5660d561153dcdb283a04c60
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge2.tar.gz
+    Size/MD5 checksum:     2651 6aff151a16ad2211e6f118efdd2fca6d
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6.diff.gz
+    Size/MD5 checksum:   783802 57cbeb3a0d58f27c5491ea92ae8760dc
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge5.dsc
+    Size/MD5 checksum:     1027 7152d7aa17c4632a0e9ef450e92d3850
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge6.tar.gz
+    Size/MD5 checksum:    12009 a9d2d3f315b9e2ddcb835ac35b993e82
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz
+    Size/MD5 checksum:   870765 f5af615e39441d95471bdb72a3f01709
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge5.tar.gz
+    Size/MD5 checksum: 15980836 2ed3cdd33958dbbb79acad51633fed0e
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge3.dsc
+    Size/MD5 checksum:      685 3684714d888d9897193781152b1bb2fa
+  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5.diff.gz
+    Size/MD5 checksum:     6520 78dd7ab4110563f7cfa41546b7afda57
+  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge5.tar.gz
+    Size/MD5 checksum:    20360 f80c884ab46b2e419ca401ed21c7d698
+  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
+    Size/MD5 checksum:     9501 a4ad085824ade5641f1c839d945dd301
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge6.dsc
+    Size/MD5 checksum:     1130 67e25655311032dc532f331bfaad529e
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge2.tar.gz
+    Size/MD5 checksum:   105479 c2b1bb5c024aec2c4938866fda42a536
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge3.dsc
+    Size/MD5 checksum:      846 e49c48cbef5fce4aac4ca3bfd9b97518
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-3.dsc
+    Size/MD5 checksum:     1050 2930e25b0b2978c257ea94b7c0f385f4
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge3.tar.gz
+    Size/MD5 checksum:     2281 d72e0b2a828d4db9076142f8092a83b0
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge2.dsc
+    Size/MD5 checksum:      825 1b3ccb11081c743293e515f0864f76f7
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4.diff.gz
+    Size/MD5 checksum:    33474 f96bd95e933f2ad4184a64141a11a375
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge6.tar.gz
+    Size/MD5 checksum:  1466506 4077db3abe1299270d37ab358e8f5443
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge6.dsc
+    Size/MD5 checksum:     1143 1434f7f54c70afe26043692c12537e57
+  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5.dsc
+    Size/MD5 checksum:      750 2ae692be75bc5bd0ae47105ec3b903e4
+  http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz
+    Size/MD5 checksum:   142961 eb3d1df2d3b46f199af2485db612c76d
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4.dsc
+    Size/MD5 checksum:     1089 5f669ca85a85782c1040d45c351d965e
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge2.dsc
+    Size/MD5 checksum:      663 afa6f7006f0e5f28f08f81ab0c0cba7b
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge3.tar.gz
+    Size/MD5 checksum:     1987 e4c3061eb307723a40cd3bbc0e28fcc4
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge3.dsc
+    Size/MD5 checksum:     1092 1682bf8794992d2bd327227cbe21fb77
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge6.tar.gz
+    Size/MD5 checksum:   101379 c5fde5cda4bc40b613e3eb8389464e00
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge6.tar.gz
+    Size/MD5 checksum:    57143 4e1252ccc54094413af132b1e509c78a
+  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge5.dsc
+    Size/MD5 checksum:      732 c78ef81ca5b402222e7137d1a8052748
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-3.tar.gz
+    Size/MD5 checksum:   310504 a95d863d77233921e79185c3dac62f94
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge2.tar.gz
+    Size/MD5 checksum:     1629 631165e8731c66fc60e875371c649a03
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6.dsc
+    Size/MD5 checksum:      900 cacb4fcef0ee57a53ba0efbfcae9d3cf
+  http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge2.diff.gz
+    Size/MD5 checksum:     9671 afae6ba433c81376fc42fb5de1750169
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
+    Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge6.tar.gz
+    Size/MD5 checksum:    14303 50eac91503e4d951e8c555470526c56d
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge6.dsc
+    Size/MD5 checksum:      839 09f407768d0a85fa121f68595bf6d9da
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge6.dsc
+    Size/MD5 checksum:     1582 d905f8b5191e92587b2694776bfd2162
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.tar.gz
+    Size/MD5 checksum:    33837 94e6565cd478f866a0f079b8d5de5b1e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge6.dsc
+    Size/MD5 checksum:     1074 872a5a07e8a19c0544ca02dccc59730c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge6.tar.gz
+    Size/MD5 checksum:    37326 dcdb061379c1e912712be472ef423a2e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge6.dsc
+    Size/MD5 checksum:      832 e877d255836a119568f2b811484509a8
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge3.tar.gz
+    Size/MD5 checksum:     2328 c3f3f0a00cd017334a3d045142f11b6f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge6.tar.gz
+    Size/MD5 checksum:    26268 6401b539084d362190963c16487ac91d
+
+Architecture independent packages:
+
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge2_all.deb
+    Size/MD5 checksum:   159972 52f3d8c35dc66b3806fdcbd5911172ef
+  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge5_all.deb
+    Size/MD5 checksum:  2424128 6bc37ebffcc8af7d71edabbc29edff9e
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:   119874 6320eef7e64b58239bbf976787178a86
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge6_all.deb
+    Size/MD5 checksum:   752214 ea5d65d5f1c650e0b9d7db4373df65b4
+  http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge4_all.deb
+    Size/MD5 checksum:   304594 17171ede79299ea662c0eb92c09d7b89
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge6_all.deb
+    Size/MD5 checksum:    28966 2f946b48d7784fd66e1833972999b091
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6_all.deb
+    Size/MD5 checksum: 31485082 d8e3315c288f5550386686d4f56b945b
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:    32790 6e1a1822035ee3eacd9b64adc1e9af57
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:    18512 8f686699219008d35136f3eda8846894
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:  9548918 f2d22e050aec4e3cdef89fa36d0a1acd
+  http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge2_all.deb
+    Size/MD5 checksum:   106162 c020f32c2b9c0bb3f60a8d7aa536202b
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge6_all.deb
+    Size/MD5 checksum:  3590114 333eed9fc4f7de67d8d348b4437e212d
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:   633864 aa02fdc51feb16ab51aa2d0b864b5033
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge4_all.deb
+    Size/MD5 checksum:   945778 b5cd269a473566b2eab20477bb5ccc75
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:  4762284 0e4f9547acf07ac7eac578acd7062289
+  http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge5_all.deb
+    Size/MD5 checksum:    32908 c38aa76390664cd61cd39fcafdc061e3
+
+alpha architecture (DEC Alpha)
+
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge3_alpha.deb
+    Size/MD5 checksum:     2004 b85b43e7e593767ac3c2e9759800441c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb
+    Size/MD5 checksum:   275104 ac124d1aef568fc04144cfde499ba818
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb
+    Size/MD5 checksum: 16991940 3644d797f1b4f4fe17810fc128ecfef2
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-4_2.4.27-10sarge6_alpha.deb
+    Size/MD5 checksum:     9536 818db9ca2e9411bd9395956f8a466850
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_alpha.deb
+    Size/MD5 checksum:    21868 b3b80288bf4fa33ee8173b71396b1ed8
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge3_alpha.deb
+    Size/MD5 checksum:     2008 44d187a24b738878ec0624a096fdb5f4
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb
+    Size/MD5 checksum:   277016 f7a91380e5f5a795a4eccfcff273a2b1
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge3_alpha.deb
+    Size/MD5 checksum:     2016 55ea69109097ddcc254609df82c98e91
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge3_alpha.deb
+    Size/MD5 checksum:     2010 5095855832ed1006e4d11c2d9e0325b7
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb
+    Size/MD5 checksum: 16537164 250c932f3b2048587f8dc8e41ab26926
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4_2.4.27-10sarge6_alpha.deb
+    Size/MD5 checksum:  4649894 e46f99205e2b499dabf3e13b6778d776
+
+amd64 architecture (AMD x86_64 (AMD64))
+
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_amd64.deb
+    Size/MD5 checksum:    18612 89c5c3f01d1715252ac3ec8ba363b9de
+
+arm architecture (ARM)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:  1698658 af8a1eb0a1eab58c562f639343ee5101
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:  1062484 fdac028111ef3d2a5bf226e21d74b394
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:   484774 106d72fdc046ad8ab48bf45aff7319da
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:  3168914 a7539fe4daefea79532eda6846e92382
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:  4728038 305dbb3ab1d46dbeac5aeb1db685853e
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_arm.deb
+    Size/MD5 checksum:    20346 1976571746db1bdc1ce05b0638cde4c7
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:  7379444 1d96d07f4b98258c48e37a3ce3fb9816
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge6_arm.deb
+    Size/MD5 checksum:  3693056 ec852f94b459dec72e9e776d7b7babdf
+
+hppa architecture (HP PA RISC)
+
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_hppa.deb
+    Size/MD5 checksum:    20722 f9b295e020b4898e0cee48fa9d1ab90e
+
+i386 architecture (Intel ia32)
+
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge2_i386.deb
+    Size/MD5 checksum:     2190 de7c785f29cfac9758d90c48c8eb5bca
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-386_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77904 8e0633c48d4a196eb7d750f75bd7068a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   301002 3aab4d4883d87b229d48fac30d41e603
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   296070 d790eb36fc3213aefb7deba17a3cbeeb
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge2_i386.deb
+    Size/MD5 checksum:     2250 4d72f7bd505333cee3e3e6fe24b35cfc
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k7_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77702 fec475b02fa1569acc7a2fd254736c89
+  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge5_i386.deb
+    Size/MD5 checksum: 11314694 5d9e7fbdcfde268a978f4c57bac8a445
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge2_i386.deb
+    Size/MD5 checksum:     2210 94453df286d5f4e53129c9ad21c48269
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:   165342 2d7a7d95cd8659cbae4a293ed5247443
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge2_i386.deb
+    Size/MD5 checksum:     2258 e07b801edb75bff62ff274577b74e41f
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_i386.deb
+    Size/MD5 checksum:    17980 2811fbff5ff6904b4100d713b48ccffc
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-386_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   301320 9017891e4c79068047e4af5cb929c31c
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-586tsc_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   477780 65991feae9a3464324fb4fd9a380ef00
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k6_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33488 b11e22c02586f81d1ce395ae1244428e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 12439378 fbc7f2c6e8a05225049e8cc5ff42fc32
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge2_i386.deb
+    Size/MD5 checksum:     2232 ca5ab5706cf7092c57853b73611ccf37
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-686_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 12357440 3892ecb2b0fb49a3ade013e27485320d
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k6_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   477686 7b9b7b5442441dc35b0d17f785dfce87
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-386_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33496 dc6d281fab6c1ab610e419758fd7b895
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge2_i386.deb
+    Size/MD5 checksum:     2290 3656872aeedf815c3fb157e27a35aeed
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge2_i386.deb
+    Size/MD5 checksum:     2200 99dc53e529fe3780b87ebea56bc3a9e2
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-686-smp_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33504 4683e862b99aee94cce49c7e24f4ca8d
+  http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    77984 62558920315cbde876f88380f87a577d
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   301974 e32d1efb04c53424e0b8760e155e807c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:  1857996 3727b12f2acaa3429b9f845c5fafa4b2
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge2_i386.deb
+    Size/MD5 checksum:     2208 ecaf8a85eeab65f53b7cfc369e872741
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge2_i386.deb
+    Size/MD5 checksum:     2180 d493e7439c2ac668aa8af8e300476a32
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge2_i386.deb
+    Size/MD5 checksum:     2236 9899de5f907ce3bf505230f57e8e977f
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge2_i386.deb
+    Size/MD5 checksum:     2296 cf0ed26b54117f21c940785dd5cd6361
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge2_i386.deb
+    Size/MD5 checksum:     2200 8b295e8d54d56803114aca936edb9b3b
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k7-smp_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77762 7cd84fb3f7ccac997edf9ad814f596fc
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-686-smp_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77702 c33cd973e0b5f4426e1ff15c2b07bb93
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-686_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77634 8fd76652c4e0c63f65a06a596306f7e2
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge2_i386.deb
+    Size/MD5 checksum:     2232 56e34da6218d5a9f5c495dbfa5b55234
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686-smp_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:   169666 5ab7867f5d9fa479e8a8f96cd6fa9fc8
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k7_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2458 fde4680c9802476653d87385f7553110
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge2_i386.deb
+    Size/MD5 checksum:     2320 7e9d9c4d9e27630f3177f0ed33445958
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k6_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77642 de16e1b5ef4844c9b3619c6d0866a06c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   307908 3a4cfc236fd895b79aa34a61aa25f4ea
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-586tsc_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2452 448ea77ae78b84b31074c06310abff2d
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-686-smp_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2466 630fcf555d96bbefe36adc031b1590dd
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   303850 d3105a688746ddd36d618018e9b53d1a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   296314 a124cb2d7c7cc1a0462f34f40f341eef
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge2_i386.deb
+    Size/MD5 checksum:     2278 5747a8a13621d34006e02e12ddecfdf5
+  http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge5_i386.deb
+    Size/MD5 checksum:  4845086 75f294bc16c692a9d047cacfab9e843b
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-686_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33492 869083538e79481e56094549c5321cd0
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-386_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2446 d0f3f731301d12a7e83e0adc5e6faab5
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 12107272 6b1b8f925a1ff13b140f061215f47e09
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:   163754 ac42725375d4e828b4220d84f7f92ef7
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 12700924 759c414f04d4765e26c2b40957fc9ab4
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7-smp_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:   168080 6dbbcfbcef54fcef4106675d84bf75c1
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k7_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   477716 568d8b1052dbaff75b1d08e75b503dc9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   301394 09804682d0b2db2150fab0a9bd95d163
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k6_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2462 1f0c32839c6fac5010d7a37bd29ac335
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-386_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:   147744 f4e889628f1479ca845848c374ba94d4
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge2_i386.deb
+    Size/MD5 checksum:     2214 cceb0bf335f590d45b56060150be29e6
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k7-smp_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   484410 1b0e0136ac477ad58a991da10fef9275
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-686_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   302266 db4c30615a7cbdd1dc4e81b23b5e9a03
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-686_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   477742 b5fcc0041e57a89f2497a94934ab051f
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k7-smp_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33500 84fe5e6f5efe32f98d65732bbfe658ab
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-686_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   302150 0acd56708c0e9b1eb13ed65c301eb4e5
+  http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    94012 2f7dd855a2776ace2161f61c9da880d4
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge2_i386.deb
+    Size/MD5 checksum:     2218 6c564fa8fbe8eb3fed7547f363a5f3d3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   302272 00ce79f3215cf690cd6f9a5d588fb46a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 11725582 1a891346b963cea2591e0c2a2b40d418
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge2_i386.deb
+    Size/MD5 checksum:     2228 e49a7f6a1ebf9217ca427fe98bef9ef5
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge2_i386.deb
+    Size/MD5 checksum:     2212 c596e89ceb9694a47531542a81618fe8
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-4_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:    11964 5eaca507dc75c7dd8a5fea8a98adae17
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge2_i386.deb
+    Size/MD5 checksum:     2192 ed4d6c14605c790b4b1514479cf2a4dc
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-686_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2454 51c30ec77e9345f6eb930a2684cc72f9
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k7_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33488 b83277fd8366c6120159be2d61c219cc
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-386_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   271418 0ece32ae57e8bc07909d472a27f75fad
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-586tsc_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    33506 b8318c2a64dfc2ed3a6997c958d2d4a8
+  http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5_i386.deb
+    Size/MD5 checksum:  7773920 5ce6990c1c05480e64d479e63e8e573c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   290140 ac3904823f38ee87f5d474b97989f1b7
+  http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-586tsc_2.9.1-1sarge2_i386.deb
+    Size/MD5 checksum:    77644 e74884dab42407313589891ff9bab2ec
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-686-smp_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   484382 3ce4020ba4761da02bf838277169b514
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge2_i386.deb
+    Size/MD5 checksum:     2274 a0ae0ea68ab8e0ad0b5c7ce84c648205
+  http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:   474474 1e8df851476f1d44b88888c9c67ea104
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-386_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 11052808 11a2d541ae4be60fc4ca0b012e040731
+  http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge4_i386.deb
+    Size/MD5 checksum:    56474 1f0f3fa67108dbde771d44446870feb1
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum:   303960 a0124d96976fdb5295d88e4452c3e482
+  http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k7-smp_0.3.7-1sarge3_i386.deb
+    Size/MD5 checksum:     2466 b429be79430479aa6195e9be4df2df32
+  http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-386_3.2.5+2sarge2_i386.deb
+    Size/MD5 checksum:   477778 b11e7c242050e16293ad1163f60770cb
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
+    Size/MD5 checksum: 12040558 85ecbc317471b19622aa4c881787ccc4
+
+ia64 architecture (Intel ia64)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:     8784 90ee1b2e9043eb5c304e341e4341f307
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-mckinley-smp_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum: 16989836 ac671a15b2e59ab7e740fba0a275fdeb
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-itanium_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:   244176 e992f7a9972a853416b9d661b9b1ed27
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-mckinley_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum: 16635868 a9d4e077e6988de487f454462be71b29
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-itanium_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum: 16682160 4a0aad4af20efe7b377632b2fa1ecac7
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-mckinley_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:   244174 97772e1967c86e1049a31bc3945d55bc
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:     8762 1798dbe17258645061927e62084de5eb
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_ia64.deb
+    Size/MD5 checksum:    23596 0809bc03e9bbed87e20c1cd7a1775e57
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-itanium-smp_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:   245076 794bce10f1d65a28defc12609330a563
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:     8774 c8b8a58a500877b95d05baca618b177c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-mckinley-smp_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:   245194 d697c585822843bf50471b6e8d21242e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-itanium-smp_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum: 17044112 c6b9372d496ca07bc3b67be07ebba31b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:     8744 d80a7c62442813fb1e25bfee7f1f48b7
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:  4762160 59ddcd5f8c89ceae7140b501cf215fa8
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-4_2.4.27-10sarge6_ia64.deb
+    Size/MD5 checksum:     8980 811a0f52aaf2699fcf5ce0b1f1a0bdbd
+
+m68k architecture (Motorola Mc680x0)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2636312 ebf015a5cde926e2203d59ca336859e7
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2476770 5876a64c1242781d5f15351b3fe8f180
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2395372 017278dac5baccad9a4b779d1863bf0f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2323460 164b52f450e86d51b99bd8647fefed2d
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2394638 73a3bbff4db6f767123d09be3656f6ff
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_m68k.deb
+    Size/MD5 checksum:    17720 5a457bcf29fec4d35faecb504fff648a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2543642 334a1c3125131e8844fb5de91fff3dd9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge6_m68k.deb
+    Size/MD5 checksum:  2260822 f5528d8ff99980a0f9bf3c8e8fc9e06c
+
+mips architecture (MIPS (Big Endian))
+
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-3_mips.deb
+    Size/MD5 checksum:  3879754 69d856bdbd22525f9e04ddf072189f67
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-3_mips.deb
+    Size/MD5 checksum:  4763440 587a59f384c23f18d6d9cfae96ebec35
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-3_mips.deb
+    Size/MD5 checksum:  7223008 717e19d7db9d95429064ed8bc71410fe
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_mips.deb
+    Size/MD5 checksum:    21544 8b2e659f7e486d086a876157faac6af2
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-3_mips.deb
+    Size/MD5 checksum:  3878278 70aab4ac78bbbaf2efb8ab726df4ba00
+
+mipsel architecture (MIPS (Little Endian))
+
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  2144874 50c5ff9db6a00ba939f7b7eb9a55814c
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  4112030 89122df58404e5d46f0a94f160066077
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  4756972 b8024d146f7f13bded7a6424ddfa4135
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  4681486 f4fb5fab0de0a25fc7884c1c2f2f7340
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:    21876 4ab08ad75e84cc2be8b05b9e4ba5e4ef
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  3002730 79d768298894c6534408fa4867ab5b14
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  3042270 6a1ce29b2ce437516e64def1738c370f
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-3_mipsel.deb
+    Size/MD5 checksum:  7049768 2ceaae0ecc0f1feb753bdad506280185
+
+powerpc architecture (PowerPC)
+
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_powerpc.deb
+    Size/MD5 checksum:    20340 7f20372a9ab62ca36586defd15b0a5ee
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum: 12763130 f7a7340904b21ed0a5486174ae810052
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum: 13795002 826cb8d8fa3d3c3cab66f89df073deeb
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:  1822940 205748952ae7948db55771e71ac21f56
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum: 13490792 4f0010db40e43f778ce570e95a06551f
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:    12268 d5b7af76b08c231639d192940e81a43e
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:    12344 d068007806c2e699271c71508fc1e84b
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:  4874608 8707c0663aa5822a73d16352907c95eb
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:   145224 7aaa0cf1c764ec0b8924787e61b638d4
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:  4767046 31d52974cc78bd5a3609a21da97971d3
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:    69216 29e20e7d40917be81aa249d8bf88194f
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:  2505832 7a648cfd329f18cd56f758c5365a3c8c
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:  4758074 63ed1a37308075d0b9c85dacb3025f87
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:   158946 ab63071c1853718aecce65cd3a33e1a2
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:   145044 a36ed8999258cfb8519c7b46a22e0e17
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:   158876 436532d564b7c34fe9ff134c44b28ac2
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge6_powerpc.deb
+    Size/MD5 checksum:   159174 4562756f69ef7a3c639334b3dece3835
+
+s390 architecture (IBM S/390)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390-tape_2.4.27-2sarge6_s390.deb
+    Size/MD5 checksum:   997526 9d7687e5a7d1d6930f9b12c8dbd2da86
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390x_2.4.27-2sarge6_s390.deb
+    Size/MD5 checksum:  2977638 d0e71d007359ea5fd412814b6307e05b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-4_2.4.27-2sarge6_s390.deb
+    Size/MD5 checksum:  4653304 1ef9845750b94c5034c83c9fbca61680
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge2_s390.deb
+    Size/MD5 checksum:     1916 5f3a222f65f28cc02c3dac36d9fae589
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge2_s390.deb
+    Size/MD5 checksum:     1904 e82185af5c4ffc366c91a62c3710b0f7
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_s390.deb
+    Size/MD5 checksum:    20724 35eee44d510c23faa0d5980c8e042eed
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390_2.4.27-2sarge6_s390.deb
+    Size/MD5 checksum:  2785758 f0ee3b3b6eb3ff47a5ab1c8bff6541f5
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge2_s390.deb
+    Size/MD5 checksum:     1902 e50783f20196403fdb201296faa5f955
+
+sparc architecture (Sun SPARC/UltraSPARC)
+
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge3_sparc.deb
+    Size/MD5 checksum:     2224 3640903c50cf3f5ac3ca07e4f1a23e4c
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge3_sparc.deb
+    Size/MD5 checksum:     2228 e25173a6212f5788a1eee7272033d92e
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge3_sparc.deb
+    Size/MD5 checksum:     2208 2245a85962621b06eab854d81f5e2bd9
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge3_sparc.deb
+    Size/MD5 checksum:     2210 c67bc9270fa69033579ded9a949b0c40
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc32-smp_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:  3796458 c3c25c364e5c6c8eaf5fc73c95d53095
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc32_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:   166596 ee5ba57e8ee80b5e7aedd28223db597f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc64_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:   204932 f8d2bd0fa36e751487006104cad3edc8
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc64-smp_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:   206334 a659ec6ca6d0fbd1514c5423bac879e9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:  2063174 5f91e658e46a6d7b7bdf184bc51d5868
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge3_sparc.deb
+    Size/MD5 checksum:     2238 59514eec80d5fdf2e92cb943c50eb9b9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc32-smp_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:   168392 a0c16b5ed34ca2a6f7b2ed8bdab19f84
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc32_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:  3607258 a5c1e2b59cb0c343a22ea70a1c125692
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge3_sparc.deb
+    Size/MD5 checksum:     2238 b603643edb3cdd828155317d85cc46ef
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge3_sparc.deb
+    Size/MD5 checksum:     2228 aac7dfd77156b6b90ca18fc8c1cff974
+  http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_sparc.deb
+    Size/MD5 checksum:    19570 151b78bcb24f03464721cd886ccd9a85
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-4_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:    12010 a1c148d768477fc35842fdd0250869d6
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc64_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:  6390868 95135f6d77474f138d24322ccb7d505f
+  http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge3_sparc.deb
+    Size/MD5 checksum:     2232 746057a5e29dbdb064bcf4b772d7bf99
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc64-smp_2.4.27-9sarge6_sparc.deb
+    Size/MD5 checksum:  6555152 1df415fa9711c74f3c344271bf8ecf0d
+
+
+  These files will probably be moved into the oldstable distribution on
   its next update.
 
 ---------------------------------------------------------------------------------

Copied: dsa-texts/2.6.8-17sarge1 (from rev 1138, dsa-texts/2.4.27-10sarge6)
===================================================================
--- dsa-texts/2.6.8-17sarge1	                        (rev 0)
+++ dsa-texts/2.6.8-17sarge1	2008-02-22 22:11:44 UTC (rev 1146)
@@ -0,0 +1,486 @@
+------------------------------------------------------------------------
+Debian Security Advisory DSA-1504                  security at debian.org
+http://www.debian.org/security/                           dann frazier
+February 22, 2008                   http://www.debian.org/security/faq
+------------------------------------------------------------------------
+
+Package        : kernel-source-2.6.8 (2.6.8-17sarge1)
+Vulnerability  : several
+Problem-Type   : local
+Debian-specific: no
+CVE ID         : CVE-2006-5823 CVE-2006-6054 CVE-2006-6058 CVE-2006-7203
+                 CVE-2007-1353 CVE-2007-2172 CVE-2007-2525 CVE-2007-3105
+                 CVE-2007-3739 CVE-2007-3740 CVE-2007-3848 CVE-2007-4133
+                 CVE-2007-4308 CVE-2007-4573 CVE-2007-5093 CVE-2007-6063
+                 CVE-2007-6151 CVE-2007-6206 CVE-2007-6694 CVE-2008-0007
+
+Several local and remote vulnerabilities have been discovered in the Linux
+kernel that may lead to a denial of service or the execution of arbitrary
+code. The Common Vulnerabilities and Exposures project identifies the
+following problems:
+
+CVE-2006-5823
+
+    LMH reported a potential local DoS which could be exploited by a malicious
+    user with the privileges to mount and read a corrupted cramfs filesystem.
+
+CVE-2006-6054
+
+    LMH reported a potential local DoS which could be exploited by a malicious
+    user with the privileges to mount and read a corrupted ext2 filesystem.
+
+CVE-2006-6058
+
+    LMH reported an issue in the minix filesystem that allows local users
+    with mount privileges to create a DoS (printk flood) by mounting a
+    specially crafted corrupt filesystem.
+
+CVE-2006-7203
+
+    OpenVZ Linux kernel team reported an issue in the smbfs filesystem which
+    can be exploited by local users to cause a DoS (oops) during mount.
+
+CVE-2007-1353
+
+    Ilja van Sprundel discovered that kernel memory could be leaked via the
+    Bluetooth setsockopt call due to an uninitialized stack buffer. This
+    could be used by local attackers to read the contents of sensitive kernel
+    memory.
+
+CVE-2007-2172
+
+    Thomas Graf reported a typo in the DECnet protocol handler that could
+    be used by a local attacker to overrun an array via crafted packets,
+    potentially resulting in a Denial of Service (system crash).
+    A similar issue exists in the IPV4 protocol handler and will be fixed
+    in a subsequent update.
+
+CVE-2007-2525
+
+    Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
+    by releasing a socket before PPPIOCGCHAN is called upon it. This could
+    be used by a local user to DoS a system by consuming all available memory.
+
+CVE-2007-3105
+
+    The PaX Team discovered a potential buffer overflow in the random number
+    generator which may permit local users to cause a denial of service or
+    gain additional privileges. This issue is not believed to effect default
+    Debian installations where only root has sufficient privileges to exploit
+    it.
+
+CVE-2007-3739
+
+    Adam Litke reported a potential local denial of service (oops) on
+    powerpc platforms resulting from unchecked VMA expansion into address
+    space reserved for hugetlb pages.
+
+CVE-2007-3740
+
+    Steve French reported that CIFS filesystems with CAP_UNIX enabled 
+    were not honoring a process' umask which may lead to unintentinally
+    relaxed permissions.
+    
+CVE-2007-3848
+
+    Wojciech Purczynski discovered that pdeath_signal was not being reset
+    properly under certain conditions which may allow local users to gain
+    privileges by sending arbitrary signals to suid binaries.
+
+CVE-2007-4133
+
+    Hugh Dickins discovered a potential local DoS (panic) in hugetlbfs.
+    A misconversion of hugetlb_vmtruncate_list to prio_tree may allow
+    local users to trigger a BUG_ON() call in exit_mmap.
+
+CVE-2007-4308
+
+    Alan Cox reported an issue in the aacraid driver that allows unprivileged
+    local users to make ioctl calls which should be restricted to admin
+    privileges.
+
+CVE-2007-4573
+
+    Wojciech Purczynski discovered a vulnerability that can be exploited
+    by a local user to obtain superuser privileges on x86_64 systems.
+    This resulted from improper clearing of the high bits of registers
+    during ia32 system call emulation. This vulnerability is relevant
+    to the Debian amd64 port as well as users of the i386 port who run
+    the amd64 linux-image flavour.
+
+CVE-2007-5093
+
+    Alex Smith discovered an issue with the pwc driver for certain webcam
+    devices. If the device is removed while a userspace application has it
+    open, the driver will wait for userspace to close the device, resulting
+    in a blocked USB subsystem. This issue is of low security impact as
+    it requires the attacker to either have physical access to the system
+    or to convince a user with local access to remove the device on their
+    behalf.
+    
+CVE-2007-6063
+
+    Venustech AD-LAB discovered a a buffer overflow in the isdn ioctl
+    handling, exploitable by a local user.
+
+CVE-2007-6151
+
+    ADLAB discovered a possible memory overrun in the ISDN subsystem that
+    may permit a local user to overwrite kernel memory leading by issuing
+    ioctls with unterminated data.
+
+CVE-2007-6206
+
+    Blake Frantz discovered that when a core file owned by a non-root user
+    exists, and a root-owned process dumps core over it, the core file
+    retains its original ownership. This could be used by a local user to
+    gain access to sensitive information.
+
+CVE-2007-6694
+
+    Cyrill Gorcunov reported a NULL pointer dereference in code specific
+    to the CHRP PowerPC platforms. Local users could exploit this issue
+    to achieve a Denial of Service (DoS).
+
+CVE-2008-0007
+
+    Nick Piggin of SuSE discovered a number of issues in subsystems which
+    register a fault handler for memory mapped areas. This issue can be
+    exploited by local users to achieve a Denial of Service (DoS) and possibly
+    execute arbitrary code.
+
+The following matrix lists additional packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+                                 Debian 3.1 (sarge)
+     kernel-image-2.6.8-alpha    2.6.8-17sarge1
+     kernel-image-2.6.8-amd64    2.6.8-17sarge1
+     kernel-image-2.6.8-hppa     2.6.8-7sarge1
+     kernel-image-2.6.8-i386     2.6.8-17sarge1
+     kernel-image-2.6.8-ia64     2.6.8-15sarge1
+     kernel-image-2.6.8-m68k     2.6.8-5sarge1
+     kernel-image-2.6.8-s390     2.6.8-6sarge1
+     kernel-image-2.6.8-sparc    2.6.8-16sarge1
+     kernel-patch-powerpc-2.6.8  2.6.8-13sarge1
+     fai-kernels                 1.9.1sarge8
+
+We recommend that you upgrade your kernel package immediately and reboot
+the machine. If you have built a custom kernel from the kernel source
+package, you will need to rebuild to take advantage of these fixes.
+
+Upgrade Instructions
+--------------------
+
+wget url
+        will fetch the file for you
+dpkg -i file.deb
+        will install the referenced file.
+
+If you are using the apt-get package manager, use the line for
+sources.list as given below:
+
+apt-get update
+        will update the internal database
+apt-get upgrade
+        will install corrected packages
+
+Debian 3.1 (oldstable)
+----------------------
+
+Oldstable updates are available for alpha, amd64, hppa, i386, ia64, m68k, powerpc, s390 and sparc.
+
+Source archives:
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-6sarge1.dsc
+    Size/MD5 checksum:      846 4503eeaf9e1a21a9f220e2d9c31e0123
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-15sarge1.dsc
+    Size/MD5 checksum:     1191 bfba4b91bbd166d14d0bace5ac137715
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-17sarge1.diff.gz
+    Size/MD5 checksum:  1124155 d0e37e157fd2c4a9889222377ae6a956
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-6sarge1.tar.gz
+    Size/MD5 checksum:    18572 fffdd006af1f26150eb6131f10c14c8f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-7sarge1.tar.gz
+    Size/MD5 checksum:    73206 97e4fadb9612c1a9ce969a0cbdc663f4
+  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge8.dsc
+    Size/MD5 checksum:      621 fd5cf0a4b08aadf72cedb8029390fdeb
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-17sarge1.dsc
+    Size/MD5 checksum:     1103 27f8b65b1acae74eac82f6484edbc5e5
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-17sarge1.tar.gz
+    Size/MD5 checksum:    44625 4e68e046835cd0dce3ba2dc096f21924
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-13sarge1.tar.gz
+    Size/MD5 checksum:    32565 406db278e655291be89254da5a4e15f8
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-7sarge1.dsc
+    Size/MD5 checksum:     1013 defcdc70dd9d969ddfaed2819b341758
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-15sarge1.tar.gz
+    Size/MD5 checksum:    69734 a5e62e3da21f1e89e1c7f76508de9673
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-17sarge1.tar.gz
+    Size/MD5 checksum:    82008 c90b3a12c9bf77807d0d5c3ab6cf1567
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-5sarge1.tar.gz
+    Size/MD5 checksum:    22997 75027ce480514543ad6d565d43890a3e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-16sarge1.tar.gz
+    Size/MD5 checksum:    32414 676fdb7a2c0cb66cd6c13a75b836f755
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-16sarge1.dsc
+    Size/MD5 checksum:     1036 088234b948dd74a6c869f743a5346a54
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-17sarge1.dsc
+    Size/MD5 checksum:      812 e12f4f68ee249f53bab5b4752d6b2795
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-17sarge1.tar.gz
+    Size/MD5 checksum:    96384 bd4d726f97468d6cca1139cf80b1342a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-17sarge1.dsc
+    Size/MD5 checksum:     1047 80bb021a47b74d6b1e486c2bba6c55b8
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-17sarge1.dsc
+    Size/MD5 checksum:     1002 0a956bc9d48251885d52d4b4d4b07310
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-13sarge1.dsc
+    Size/MD5 checksum:     1071 39e866b6617c57f4acf7e06d3b7ae82e
+  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge8.tar.gz
+    Size/MD5 checksum:    32434 ee1ef40c64f09bcdc25d9c9b7ea325e0
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-5sarge1.dsc
+    Size/MD5 checksum:      874 9db0c07fe9a8cc114a82f3d4f8a209a9
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
+    Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
+
+Architecture independent packages:
+
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-17sarge1_all.deb
+    Size/MD5 checksum: 34955480 ece884d31c0a9bd290d467f00973252e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-6sarge1_all.deb
+    Size/MD5 checksum:    16650 2304fae6c3d145826acea1403133ef98
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-17sarge1_all.deb
+    Size/MD5 checksum:    39758 12ee237ef5816a9c1f87697a0397802a
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-17sarge1_all.deb
+    Size/MD5 checksum:  6190062 e7e672dd30a416f98fb8dd3ead7e938b
+  http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-17sarge1_all.deb
+    Size/MD5 checksum:  1194926 dfc3e12e6e7739c91c17e150a7242fa2
+
+alpha architecture (DEC Alpha)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-generic_2.6.8-17sarge1_alpha.deb
+    Size/MD5 checksum:   238146 8dd62b8c39cceeedd5efaa4b2eee4582
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-smp_2.6.8-17sarge1_alpha.deb
+    Size/MD5 checksum:   232626 0f789080227336bd274f4ddacc4a749b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4_2.6.8-17sarge1_alpha.deb
+    Size/MD5 checksum:  2765374 6f857f2bc6f2f0d5a94a98ae814c4e87
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-smp_2.6.8-17sarge1_alpha.deb
+    Size/MD5 checksum: 20094120 e0a3941fdaa513458f54b78e5b3ebd41
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-generic_2.6.8-17sarge1_alpha.deb
+    Size/MD5 checksum: 20242970 0944d9b857e2383f2748fab122de3a5d
+
+amd64 architecture (AMD x86_64 (AMD64))
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum:   225228 fc7e590bc877da3505ee3442409bf8ee
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum:   228186 4663c6daf166b5559e408795f44d84f5
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum: 12579110 41c47936fe7cd1bb8e28177cf282e957
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum:   231428 dfdf341727fcca4af9ff41f7f0046e1b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum: 13238846 51bca8a45157f119dc001e786e325cca
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum: 13063162 14486d83aee59b7616ff63de003340ac
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum: 13275762 767dcb70ca259ff0dc07f6cb8351a83d
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum:  2728264 db7534ded22b911afffa5413d540dbbd
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum:   226722 33c904e9fd0a2f754f0d5aed640a3bd3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum:   230322 917d95bec917d2a7588867f81d88a2e9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-17sarge1_amd64.deb
+    Size/MD5 checksum: 13082028 78be67d79a13baba4a6c798624f7f818
+
+hppa architecture (HP PA RISC)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum:  2820206 0a14c1185bcde28d0a97eaeef9e11e3f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum: 17550802 fabf823c16fcb3e0bbf69d0081faafd8
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum:   219244 ff1d717d7b3d1db40c96d15b96b8a447
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum: 18374164 e088d77a7e64efa4d825416f94fd5db6
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum:   220054 5e8db88176af86cf5d5968dac2816ac6
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum: 17020158 1e3f2fc9f9764e1823054df8abde860c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum:   220598 e3419d467dc69e90e2db720c519268d3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum: 16110870 cb91278b4861aa27da3555e3ae05a842
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64_2.6.8-7sarge1_hppa.deb
+    Size/MD5 checksum:   219758 ff98c244a5777bf1cb9d3aa42e92035b
+
+i386 architecture (Intel ia32)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   258700 b406cff5cdfce0b1ebb0999b940bcf77
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-386_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 14079400 b3034d3d756026061d6d1ae64f7670ac
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   226622 89ab2fe13383be55139f779983e76f56
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   228124 0232808c2f4af4679ff387fd5aef30c2
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 13238830 83c9fa536a5039d9b7faaedd55c0d2df
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 13208166 7d76aba45eeea785e68e144c93f8fa55
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   231474 a9af96e38de18058a0bbb855ed0193f3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 15558172 1ef83fe26c46d25f209cb0a76140c0e3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 13236626 fad30247937094d606a01d53a2eff086
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:  2728376 e2538d185c863ac7adf9dd41ac73f83d
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 15397692 580feea340f69d04fafcd052268bb314
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 15173410 f477356acda36ec633c3bee285794377
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:  2784978 76f4162d37d785b5e0648435936774f6
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-386_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   263456 3ddcc23d88f64f8a185c3a3dc4ae3402
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   225052 c266db2ed1f497b91c8202c2e9511bd3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 15282426 bce3bfbc0e6aede5dc503b37935b050a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   230266 2172a8e3ff5107cb582b5a31111b904b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   258222 e02e548b571117fa3a0b68add40c3893
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   260930 a4765a3da36be625c104281daecc29d2
+  http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge8_i386.deb
+    Size/MD5 checksum: 12010766 5c06b0a78b203b2032aa327839fa9795
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum:   260956 5bf06a1619132b0624299735caf26879
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 12579278 f6c685f628478fcc8f37257a6e71aedd
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-17sarge1_i386.deb
+    Size/MD5 checksum: 13276128 541fc888c5aa5dee5e186185d1f2256f
+
+ia64 architecture (Intel ia64)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum: 21496770 8336b695564c2eb6d8dc98a13c3b4e1a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:   205878 2f8285b89e03dee6c71f9d8079d13499
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12228 b69b46b5a764b898baaf3ba3ad056d5f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12162 3d5dfd32448f8cb967dd1ce9549789af
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:  3104422 af94110dd2e8401a975315dd93aaa28b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12172 618961c987120133ee1c999e4cf5f62f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12236 7ca412f9885d85f92340423de43e284f
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12140 031a5db578a7291bf25c13b7be4b4ec6
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:   206340 85610c56d71469abb003503c9395f639
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:   206076 62768e32c962c2f1f2f19c0062800557
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12202 a4a24b0e48c4f6c2c3d8ab17fc6fe4ae
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum: 21417820 daa90c69a36eb5baf3231fed495766e1
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:   205672 e5befe9b90d7f8d43ed7e1dfff89851c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum: 22158208 8a186facbb3023845284531d27c01486
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12136 fe3ae95000fba99026557e9f3110eef9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum: 22174026 de343e5cddd6936ec435cdc87d5ab689
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-15sarge1_ia64.deb
+    Size/MD5 checksum:    12200 75abbf3dc640b0765b0f510c0c783ecb
+
+m68k architecture (Motorola Mc680x0)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  2997446 90b62190daab090dd211b2e2fa76e634
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  3053150 9876f36e6cbad66ac690362955b3ee6c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  3111618 38fdf55f9f32aa26df0b3001fd6b77a2
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  3311580 052d54a9c2e6eab73cf870634aaf78e3
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  2992404 cd498a3a110af341e7052fb06ec8b0bc
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  3178962 1160ae756c286e7e2845cbeb1326c3bb
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  2982482 677c66d0af2580084d6d061bfd63ffd4
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  3018000 89321aa5c34c8c9c95a61a86d0337699
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-5sarge1_m68k.deb
+    Size/MD5 checksum:  3105192 0a020af9116bd8ac96d2c3eb054b6840
+
+powerpc architecture (PowerPC)
+
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-4_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:  5153168 2f57ad5241d60f31e262541b1b9bf08a
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3-smp_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum: 13953866 46a1861b3cd33737bdd60a0f72f397c4
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum: 13599558 0ddb46fa72e94a9018eccfd3d2f0b40c
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc-smp_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum: 13873214 f012b664fbc58bfcdfbba594d38bc855
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4-smp_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum: 13943782 153a4ba86086ae315977b069a3c8fa3c
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:   412788 719ae014adea5b6a7c3c36b2b0e268ed
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:   412382 228e63e6d49179b0dc802b903b1b52e4
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4-smp_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:   411974 bcf255c3858b2d9a01bbbb2b7c25aff2
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum: 13616728 e6762f501e5422e23f023b79037a8ca5
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:   412034 0334c1128e3e843ebc68963633480ba4
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc-smp_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:   412136 a761c81f7e2c38637fecefeb197f8a5b
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3-smp_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum:   412708 584de35626e4445772f28341560aae76
+  http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4_2.6.8-13sarge1_powerpc.deb
+    Size/MD5 checksum: 13583634 0f334a6487d58f02b75f9102641d4541
+
+s390 architecture (IBM S/390)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390x_2.6.8-6sarge1_s390.deb
+    Size/MD5 checksum:  3199350 2dec14becfc609e1414a00a726a78153
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390_2.6.8-6sarge1_s390.deb
+    Size/MD5 checksum:  2992448 d90f45f8f995286690ed2c460f5f418b
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-4_2.6.8-6sarge1_s390.deb
+    Size/MD5 checksum:  5092100 c603b5b67a2e4be7b92fc909a64493cd
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390-tape_2.6.8-6sarge1_s390.deb
+    Size/MD5 checksum:  1150168 8cf8f4a0193c71df9a27b3362b868cc5
+
+sparc architecture (Sun SPARC/UltraSPARC)
+
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64-smp_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:  7645904 2c30dc864de96d05d0a3426b36c26d3a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:  2896286 54cdf0c85119d5a049164705e54a24d9
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc32_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:  4563634 2df1caceab9295aca03f8efb9abfa33a
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:  7449244 1833928627fd502581b283c8d508b423
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc32_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:   116254 ccfa57772f57fc041c7e2f52fc09216c
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64-smp_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:   151548 0170da5a8e3a7179073a6ee42fe41b27
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-4_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:    10856 5866644f6a69cd14120b2f27b936097e
+  http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64_2.6.8-16sarge1_sparc.deb
+    Size/MD5 checksum:   150948 ed82830f3020847472660683d0a8b5cd
+
+  These files will probably be moved into the oldstable distribution on
+  its next update.
+
+---------------------------------------------------------------------------------
+For apt-get: deb http://security.debian.org/ stable/updates main
+For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
+Mailing list: debian-security-announce at lists.debian.org
+Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>




More information about the kernel-sec-discuss mailing list