---

Advisories: December 21, 2006

Debian GNU/Linux


Debian Security Advisory DSA-1240-1 security@debian.org
http://www.debian.org/security/
Steve Kemp
December 21, 2006


Package : links2
Vulnerability : insufficient escaping
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2006-5925
Debian Bug : 400718

Teemu Salmela discovered that the links2 character mode web
browser performs insufficient sanitising of smb:// URIs, which
might lead to the execution of arbitrary shell commands.

For the stable distribution (sarge) this problem has been fixed
in version 2.1pre16-1sarge1.

For the upcoming stable distribution (etch) this problem has
been fixed in version 2.1pre26-1.

For the unstable distribution (sid) this problem has been fixed
in version 2.1pre26-1.

We recommend that you upgrade your links2 package.

Upgrade instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.1 (stable)


Stable updates are available for alpha, amd64, arm, hppa, i386,
ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.diff.gz

      Size/MD5 checksum: 28658
a83c79990bbfb6f9ec26d737f767ee90
    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16.orig.tar.gz

      Size/MD5 checksum: 4217483
7baf4fc20cc244d80ead21cebff07d89
    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.dsc

      Size/MD5 checksum: 841
ed4853334b7eebef055271df06cdcd7a

alpha architecture (DEC Alpha)

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_alpha.deb

      Size/MD5 checksum: 2110324
b3633fddb199c45339d3837bb0a519a0

amd64 architecture (AMD x86_64 (AMD64))

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_amd64.deb

      Size/MD5 checksum: 2040922
5fb402e6a833709741d20238346c7597

arm architecture (ARM)

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_arm.deb

      Size/MD5 checksum: 1996004
c7c79ddcb82d5758668ed71d74b9685f

i386 architecture (Intel ia32)

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_i386.deb

      Size/MD5 checksum: 1997426
4c1ef611e31c57583f7471653962a84a

m68k architecture (Motorola Mc680x0)

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_m68k.deb

      Size/MD5 checksum: 1904084
e5c777a07eaa88f4367b51d88c556a14

mips architecture (MIPS (Big Endian))

    http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_mips.deb

      Size/MD5 checksum: 2034596
22854de6eaf3aa1e392291760e85e5e8

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Fedora Core


Fedora Update Notification
FEDORA-2006-1491
2006-12-20


Product : Fedora Core 6
Name : thunderbird
Version : 1.5.0.9
Release : 2.fc6
Summary : Mozilla Thunderbird mail/newsgroup client

Description :
Mozilla Thunderbird is a standalone mail and newsgroup client.


Update Information:

Mozilla Thunderbird is a standalone mail and newsgroup
client.

Several flaws were found in the way Thunderbird processes
certain malformed JavaScript code. A malicious web page could cause
the execution of JavaScript code in such a way that could cause
Thunderbird to crash or execute arbitrary code as the user running
Thunderbird. JavaScript support is disabled by default in
Thunderbird; this issue is not exploitable without enabling
JavaScript. (CVE-2006-6498, CVE-2006-6501, CVE-2006-6502,
CVE-2006-6503, CVE-2006-6504)

Several flaws were found in the way Thunderbird renders web
pages. A malicious web page could cause the browser to crash or
possibly execute arbitrary code as the user running Thunderbird.
(CVE-2006-6497)

A heap based buffer overflow flaw was found in the way
Thunderbird parses the Content-Type mail header. A malicious mail
message could cause the Thunderbird client to crash or possibly
execute arbitrary code as the user running Thunderbird.
(CVE-2006-6505)

Users of Thunderbird are advised to apply this update, which
contains Thunderbird version 1.5.0.9 that corrects these
issues.


  • Tue Dec 19 2006 Matthias Clasen <mclasen@redhat.com>
    1.5.0.9-2

    • Add a Requires: launchmail (#219884)
  • Tue Dec 19 2006 Christopher Aillon <caillon@redhat.com>
    1.5.0.9-1

    • Update to 1.5.0.9
    • Take firefox’s pango fixes
    • Don’t offer to import…nothing.

This update can be downloaded from:


http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/

b412bd483c481eb2adcb833db850a36c333978bf
SRPMS/thunderbird-1.5.0.9-2.fc6.src.rpm
b412bd483c481eb2adcb833db850a36c333978bf
noarch/thunderbird-1.5.0.9-2.fc6.src.rpm
5c371d13b3209d5507448e9ebe9078521deac5fe
ppc/debug/thunderbird-debuginfo-1.5.0.9-2.fc6.ppc.rpm
a44fb695adca3b8addda5c1331a44aeea1825fb1
ppc/thunderbird-1.5.0.9-2.fc6.ppc.rpm
3cd6cc302db68faa3b1e2505820161fcc6af8efc
x86_64/debug/thunderbird-debuginfo-1.5.0.9-2.fc6.x86_64.rpm
3452f2cb4e52493ed7ccd23adae523721a3e7c63
x86_64/thunderbird-1.5.0.9-2.fc6.x86_64.rpm
c13038e3e9c6615e5b9896fc0c979a5535d7ea49
i386/debug/thunderbird-debuginfo-1.5.0.9-2.fc6.i386.rpm
ab9a4abdbad15b2e26b60e112331e5cc2741d1d5
i386/thunderbird-1.5.0.9-2.fc6.i386.rpm


Fedora Update Notification
FEDORA-2006-1492
2006-12-20


Product : Fedora Core 6
Name : firefox
Version : 1.5.0.9
Release : 1.fc6
Summary : Mozilla Firefox Web browser.

Description :
Mozilla Firefox is an open-source web browser, designed for
standards compliance, performance and portability.


Update Information:

Mozilla Firefox is an open source Web browser.

Several flaws were found in the way Firefox processes certain
malformed JavaScript code. A malicious web page could cause the
execution of JavaScript code in such a way that could cause Firefox
to crash or execute arbitrary code as the user running Firefox.
(CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503,
CVE-2006-6504)

Several flaws were found in the way Firefox renders web pages. A
malicious web page could cause the browser to crash or possibly
execute arbitrary code as the user running Firefox.
(CVE-2006-6497)

Users of Firefox are advised to upgrade to these erratum
packages, which contain Firefox version 1.5.0.9 that corrects these
issues.


  • Tue Dec 19 2006 Christopher Aillon <caillon@redhat.com>
    1.5.0.9-1

    • Update to 1.5.0.9
  • Tue Dec 5 2006 Christopher Aillon <caillon@redhat.com>
    1.5.0.8-2

    • Updated pango patches from behdad
    • Fix a leak in liveconnect
    • Fix a potential crash in CSS
    • Let Firefox handle gcc warnings; it weeds out frequent
      offenders.

This update can be downloaded from:


http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/

e1fe5ef2c1156a06026b08a9023c05c0f43fd375
SRPMS/firefox-1.5.0.9-1.fc6.src.rpm
e1fe5ef2c1156a06026b08a9023c05c0f43fd375
noarch/firefox-1.5.0.9-1.fc6.src.rpm
0e1d89ab8417844327bf5a503e44eabed4b2989d
ppc/debug/firefox-debuginfo-1.5.0.9-1.fc6.ppc.rpm
4d7214e03d8db9f236073bed272f584f70217c05
ppc/firefox-devel-1.5.0.9-1.fc6.ppc.rpm
212166e344557d93cd340a52f246d7f17e28ac93
ppc/firefox-1.5.0.9-1.fc6.ppc.rpm
ca2fb6249c633971b319363b5940702a4049fe71
x86_64/firefox-devel-1.5.0.9-1.fc6.x86_64.rpm
da7254f374f59aba18d466f025c7145181ba6c9b
x86_64/debug/firefox-debuginfo-1.5.0.9-1.fc6.x86_64.rpm
cfd3064e23d4c97c8bf0167c323b5163d2df97a0
x86_64/firefox-1.5.0.9-1.fc6.x86_64.rpm
03cc7fcdd387fa443b7d2e2b2e199c5af1e98ffd
i386/firefox-devel-1.5.0.9-1.fc6.i386.rpm
1b01573757dfddb260ce4a6f3e3e4e7e2e261f79
i386/debug/firefox-debuginfo-1.5.0.9-1.fc6.i386.rpm
156f9deca5f95a0dbd6770a11ddab7ecb88b6c29
i386/firefox-1.5.0.9-1.fc6.i386.rpm

This update can be installed with the ‘yum’ update program. Use
‘yum update package-name’ at the command line. For more
information, refer to ‘Managing Software with yum,’ available at
http://fedora.redhat.com/docs/yum/.


Fedora Update Notification
FEDORA-2006-1492
2006-12-20


Product : Fedora Core 6
Name : epiphany
Version : 2.16.2
Release : 1.fc6
Summary : GNOME web browser based on the Mozilla rendering
engine

Description :
epiphany is a simple GNOME web browser based on the Mozilla
rendering engine


Update Information:

Mozilla Firefox is an open source Web browser.

Several flaws were found in the way Firefox processes certain
malformed JavaScript code. A malicious web page could cause the
execution of JavaScript code in such a way that could cause Firefox
to crash or execute arbitrary code as the user running Firefox.
(CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503,
CVE-2006-6504)

Several flaws were found in the way Firefox renders web pages. A
malicious web page could cause the browser to crash or possibly
execute arbitrary code as the user running Firefox.
(CVE-2006-6497)

Users of Firefox are advised to upgrade to these erratum
packages, which contain Firefox version 1.5.0.9 that corrects these
issues.


  • Wed Dec 20 2006 Christopher Aillon <caillon@redhat.com> –
    2.16.2-1

    • Update to 2.16.2
  • Tue Dec 19 2006 Christopher Aillon <caillon@redhat.com> –
    2.16.0-6.fc6

    • Rebuild against newer gecko

This update can be downloaded from:


http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/

bfb64e1c0e2259a474e2199f2656b11d3bb7027e
SRPMS/epiphany-2.16.2-1.fc6.src.rpm
bfb64e1c0e2259a474e2199f2656b11d3bb7027e
noarch/epiphany-2.16.2-1.fc6.src.rpm
de3f1c790567b744101e8bc5f1746e7dfa3dc2a2
ppc/debug/epiphany-debuginfo-2.16.2-1.fc6.ppc.rpm
b1ce27f3ffa935bb993861c794dcfd8d366a50c4
ppc/epiphany-devel-2.16.2-1.fc6.ppc.rpm
f49b97d088b52b7df01cb0f230eb2cee82661c66
ppc/epiphany-2.16.2-1.fc6.ppc.rpm
6cdec2f4dab14b62a028466309539d2bbf64fb40
x86_64/debug/epiphany-debuginfo-2.16.2-1.fc6.x86_64.rpm
d7d66e5ba8f049d8729c6923917421c558907068
x86_64/epiphany-devel-2.16.2-1.fc6.x86_64.rpm
3bad04377ec66504a2431fd017d11cdb62ce0062
x86_64/epiphany-2.16.2-1.fc6.x86_64.rpm
f62e4c0125d73e321a242664347afb8973d3fb00
i386/epiphany-devel-2.16.2-1.fc6.i386.rpm
819bcbed453d82a275410d358cefee62361ca4e0
i386/epiphany-2.16.2-1.fc6.i386.rpm
592eb14f22e58455c0fc9f245cc58d65ce5d8b7a
i386/debug/epiphany-debuginfo-2.16.2-1.fc6.i386.rpm

This update can be installed with the ‘yum’ update program. Use
‘yum update package-name’ at the command line. For more
information, refer to ‘Managing Software with yum,’ available at
http://fedora.redhat.com/docs/yum/.


Fedora Update Notification
FEDORA-2006-1492
2006-12-20


Product : Fedora Core 6
Name : yelp
Version : 2.16.0
Release : 11.fc6
Summary : A system documentation reader from the Gnome project

Description :
Yelp is the Gnome 2 help/documentation browser. It is designed to
help you browse all the documentation on your system in one central
tool.


Update Information:

Mozilla Firefox is an open source Web browser.

Several flaws were found in the way Firefox processes certain
malformed JavaScript code. A malicious web page could cause the
execution of JavaScript code in such a way that could cause Firefox
to crash or execute arbitrary code as the user running Firefox.
(CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503,
CVE-2006-6504)

Several flaws were found in the way Firefox renders web pages. A
malicious web page could cause the browser to crash or possibly
execute arbitrary code as the user running Firefox.
(CVE-2006-6497)

Users of Firefox are advised to upgrade to these erratum
packages, which contain Firefox version 1.5.0.9 that corrects these
issues.


  • Tue Dec 19 2006 Christopher Aillon <caillon@redhat.com> –
    2.16.0-11

    • Rebuild against newer gecko

This update can be downloaded from:


http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/

183f2de75fe16962db17e666ba0b36ee648b9355
SRPMS/yelp-2.16.0-11.fc6.src.rpm
183f2de75fe16962db17e666ba0b36ee648b9355
noarch/yelp-2.16.0-11.fc6.src.rpm
88c500ae9103b82c47c75c3a2f1b408400fd2faf
ppc/debug/yelp-debuginfo-2.16.0-11.fc6.ppc.rpm
ec7fb22ad53b07aef32b950bd4f3a2ed8c73f356
ppc/yelp-2.16.0-11.fc6.ppc.rpm
959e77abffcb43f203c166c28d24d468b92524e3
x86_64/yelp-2.16.0-11.fc6.x86_64.rpm
d04302edda30276d48ed30da14f4129bec78a06c
x86_64/debug/yelp-debuginfo-2.16.0-11.fc6.x86_64.rpm
42050ae7cbcb794a41251fb2160cc42c57d04327
i386/debug/yelp-debuginfo-2.16.0-11.fc6.i386.rpm
94f99544a2851cd4189bd72ee0f5d6c2853e895c
i386/yelp-2.16.0-11.fc6.i386.rpm

This update can be installed with the ‘yum’ update program. Use
‘yum update package-name’ at the command line. For more
information, refer to ‘Managing Software with yum,’ available at
http://fedora.redhat.com/docs/yum/.


Fedora Update Notification
FEDORA-2006-1492
2006-12-20


Product : Fedora Core 6
Name : devhelp
Version : 0.12
Release : 9.fc6
Summary : API document browser

Description :
An API document browser for GNOME 2.


Update Information:

Mozilla Firefox is an open source Web browser.

Several flaws were found in the way Firefox processes certain
malformed JavaScript code. A malicious web page could cause the
execution of JavaScript code in such a way that could cause Firefox
to crash or execute arbitrary code as the user running Firefox.
(CVE-2006-6498, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503,
CVE-2006-6504)

Several flaws were found in the way Firefox renders web pages. A
malicious web page could cause the browser to crash or possibly
execute arbitrary code as the user running Firefox.
(CVE-2006-6497)

Users of Firefox are advised to upgrade to these erratum
packages, which contain Firefox version 1.5.0.9 that corrects these
issues.


  • Tue Dec 19 2006 Christopher Aillon <caillon@redhat.com> –
    0.12.6-9

    • Rebuild against newer gecko

This update can be downloaded from:


http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/

8fbd10b55a44b7bb837ae1a1dc936b5696798985
SRPMS/devhelp-0.12-9.fc6.src.rpm
8fbd10b55a44b7bb837ae1a1dc936b5696798985
noarch/devhelp-0.12-9.fc6.src.rpm
9145f6ab2a9db597b8c9fb092a7b7336cb89271f
ppc/devhelp-0.12-9.fc6.ppc.rpm
62c7587c16a67bcc2cd8acd11eec6bb6546bbaeb
ppc/debug/devhelp-debuginfo-0.12-9.fc6.ppc.rpm
1631279a8f62e5f09728b48fcee70fc9e65d76dd
ppc/devhelp-devel-0.12-9.fc6.ppc.rpm
9fe76c4f5a4638693d61a28aa5ee7b051072c37f
x86_64/devhelp-devel-0.12-9.fc6.x86_64.rpm
eb78f0a80e8e0197742028836e6264555b5a6f45
x86_64/debug/devhelp-debuginfo-0.12-9.fc6.x86_64.rpm
5a1846f7041c2ce38a87276f936b53813410f207
x86_64/devhelp-0.12-9.fc6.x86_64.rpm
518318082d487d40607080a9489c327e04e2df90
i386/devhelp-0.12-9.fc6.i386.rpm
3e5edd56ddc8c7d441502cef5bc59848dffff390
i386/devhelp-devel-0.12-9.fc6.i386.rpm
96d5ef6f0d226be48029c186721ce45f18b27aca
i386/debug/devhelp-debuginfo-0.12-9.fc6.i386.rpm

This update can be installed with the ‘yum’ update program. Use
‘yum update package-name’ at the command line. For more
information, refer to ‘Managing Software with yum,’ available at
http://fedora.redhat.com/docs/yum/.

SUSE Linux


SUSE Security Announcement

Package: kernel
Announcement ID: SUSE-SA:2006:079
Date: Thu, 21 Dec 2006 14:00:00 +0000
Affected Products: Novell Linux Desktop 9 Novell Linux POS 9 Open
Enterprise Server SUSE LINUX 10.1 SUSE LINUX 10.0 SUSE LINUX 9.3
SUSE SLED 10 SUSE SLES 10 SUSE SLES 9
Vulnerability Type: remote denial of service local denial of
service local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2006-3741, CVE-2006-4145, CVE-2006-4538
CVE-2006-4572, CVE-2006-4623, CVE-2006-4813 CVE-2006-4997,
CVE-2006-5173, CVE-2006-5174 CVE-2006-5619, CVE-2006-5648,
CVE-2006-5649 CVE-2006-5751, CVE-2006-5757, CVE-2006-5823
CVE-2006-6053, CVE-2006-6054, CVE-2006-6056 CVE-2006-6060

Content of This Advisory:

  1. Security Vulnerability Resolved: various kernel security
    problems Problem Description
  2. Solution or Work-Around
  3. Special Instructions and Notes
  4. Package Location and Checksums
  5. Pending Vulnerabilities, Solutions, and Work-Arounds: See SUSE
    Security Summary Report.
  6. Authenticity Verification and Additional Information

1) Problem Description and Brief Discussion

The Linux 2.6 kernel has been updated to fix various security
issues.

On SUSE Linux Enterprise Server 9 and SUSE Linux Enterprise 10
and their derived products this update also contains various
bugfixes.

  • CVE-2006-4145: A bug within the UDF filesystem that caused
    machine hangs when truncating files on the filesystem was
    fixed.
  • CVE-2006-4623: A problem in DVB packet handling could be used
    to crash the machine when receiving DVB net packages is
    active.
  • CVE-2006-3741: A struct file leak was fixed in the perfmon(2)
    system call on the Itanium architecture.
  • CVE-2006-4538: A malformed ELF image can be used on the Itanium
    architecture to trigger a kernel crash (denial of service) when a
    local attacker can supply it to be started.
  • CVE-2006-4997: A problem in the ATM protocol handling clip_mkip
    function could be used by remote attackers to potentially crash the
    machine.
  • CVE-2006-5757/ CVE-2006-6060: A problem in the grow_buffers
    function could be used to crash or hang the machine using a
    corrupted filesystem. This affects filesystem types ISO9660 and
    NTFS.
  • CVE-2006-5173: On the i386 architecture the EFLAGS content was
    not correctly saved, which could be used by local attackers to
    crash other programs using the AC and NT flag or to escalate
    privileges by waiting for iopl privileges to be leaked.
  • CVE-2006-5174: On the S/390 architecture copy_from_user() could
    be used by local attackers to read kernel memory.
  • CVE-2006-5619: A problem in IPv6 flow label handling can be
    used by local attackers to hang the machine.
  • CVE-2006-5648: On the PowerPC architecture a syscall has been
    wired without the proper futex implementation that can be exploited
    by a local attacker to hang the machine.
  • CVE-2006-5649: On the PowerPC architecture the proper futex
    implementation was missing a fix for alignment check which could be
    used by a local attacker to crash the machine.
  • CVE-2006-5823: A problem in cramfs could be used to crash the
    machine during mounting a crafted cramfs image. This requires an
    attacker to supply such a crafted image and have a user mount
    it.
  • CVE-2006-6053: A problem in the ext3 filesystem could be used
    by attackers able to supply a crafted ext3 image to cause a denial
    of service or further data corruption if a user mounts this
    image.
  • CVE-2006-6054: A problem in the ext2 filesystem could be used
    by attackers supplying crafted ext2 images to users could crash the
    machine during mount.
  • CVE-2006-6056: Missing return code checking in the HFS could be
    used to crash machine when a user complicit attacker is able to
    supply a specially crafted HFS image.
  • CVE-2006-4572: Multiple unspecified vulnerabilities in
    netfilter for IPv6 code allow remote attackers to bypass intended
    restrictions via fragmentation attack vectors, aka (1) “ip6_tables
    protocol bypass bug” and (2) “ip6_tables extension header bypass
    bug”.
  • CVE-2006-5751: An integer overflow in the networking bridge
    ioctl starting with Kernel 2.6.7 could be used by local attackers
    to overflow kernel memory buffers and potentially escalate
    privileges.
  • CVE-2006-4813: A information leak in __block_prepare_write was
    fixed, which could disclose private information of previously
    unlinked files.

2) Solution or Work-Around

There is no known workaround, please install the update
packages.

3) Special Instructions and Notes

Reboot the machine after installing this update.

4) Package Location and Checksums

The preferred method for installing security updates is to use
the YaST Online Update (YOU) tool. YOU detects which updates are
required and automatically performs the necessary steps to verify
and install them. Alternatively, download the update packages for
your distribution manually and verify their integrity by the
methods listed in Section 6 of this announcement. Then install the
packages using the command

rpm -Fhv <file.rpm>

to apply the update, replacing <file.rpm> with the
filename of the downloaded RPM package.

x86 Platform:

SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-bigsmp-2.6.16.27-0.6.i586.rpm
20362ce00889e9eac688faa59ad0f301
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-debug-2.6.16.27-0.6.i586.rpm
eb33b9f8581bc89d3a4a3feecf197ef5
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-default-2.6.16.27-0.6.i586.rpm
1879d07a3b908ff8b87c507860070118
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-kdump-2.6.16.27-0.6.i586.rpm
04f60041ee278134b38e7fd9e56ef102
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-smp-2.6.16.27-0.6.i586.rpm
bc1d9c70715b5dd3495558f175abd1bf
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-source-2.6.16.27-0.6.i586.rpm
720a9e6cbf2f3594a718db1d74b0e901
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-syms-2.6.16.27-0.6.i586.rpm
fca30f1add27cb21d32eac318279f3f9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-um-2.6.16.27-0.6.i586.rpm
1af0a0a78a6cf463b04f77b52e63b57c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xen-2.6.16.27-0.6.i586.rpm
2f0499125c0aa167a2391e654c5b043b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xenpae-2.6.16.27-0.6.i586.rpm
3865d785615cf7dbbe7cae8dc5c2445e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kexec-tools-1.101-32.20.i586.rpm
c6a2bbd256a70b7cd2e4bb25f04b2771
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/mkinitrd-1.2-106.25.i586.rpm
9a26035aa882c88c7dbda60bed64e729
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/multipath-tools-0.4.6-25.14.i586.rpm
a4405ddbca3a81a15811a385760d135b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/open-iscsi-0.5.545-9.16.i586.rpm
738e1ad997da16145fa6392dff59dbd2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/udev-085-30.16.i586.rpm
e5ca4700bcbce7f4e247a04552554c52

SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.8.i586.rpm
779716bea2ce468f73b5e7be2c36cf97
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.13.i586.rpm
b95098cd1879df7c3a0bdcbe1e206e64
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.13.i586.rpm
70cf8aaeca7af078edc0907d934cf16a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.13.i586.rpm
c0aee85951759f60f10031034a0710ea
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.13.i586.rpm
5081580d742671f6a1c1654e682b0b3c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.13.i586.rpm
fcd605a287b8ab5af504f50f7a5cd04d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.13.i586.rpm
5ccb28594c3bbfd3f0d55057321f0dd3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.13.i586.rpm
9e59562a1131efca6852d4679256236a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.13.i586.rpm
3fad95aae4eeba413f61304941171628
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.13.i586.rpm
05622beea615d8b312b4953b61b90021
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.13.i586.rpm
2a59f92c159da861adcb5f7e278a3e02
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.13.i586.rpm
e630316df432d5523b00edd66a7cfcd6
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.13.i586.rpm
0894832e10d0b58235d2578e67cc928c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.13.i586.rpm
be464dab1cbc94dbb67ee7f84f8c9aa9

SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.9.i586.rpm
1d3ad978025b9d97bb7a90db61356da8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.15.i586.rpm
f225c96f36550606ea68f4ac3bfe74dc
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.15.i586.rpm
f35b5c66a2ba4437eec2b8b810eb5c6b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.15.i586.rpm
f444923fb3756410f2830dfa19b9774d
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.15.i586.rpm
2e07056e10890ffbd50c59abb40befe1
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.15.i586.rpm
096868f28a76e95f1ebc9338b110a5f0
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.15.i586.rpm
a84bf62f441f32f09884c07693c5aa18
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.15.i586.rpm
3544a5b183926981b591f89626033781
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.15.i586.rpm
d46db3e4da45262de1bf61c5b9e6a9a3
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.15.i586.rpm
f7d32fd8d0d38f0b9ac1f0cf98ab1a1c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.15.i586.rpm
a862ec208be9e31dcff7dbf7c540d5a4
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.15.i586.rpm
5323a6c912bf2ea3aecfe01f1f25029f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.15.i586.rpm
f6ec0b9626fed9f54919415fa5d262a5
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.9.i586.rpm
116853b601518db7e3f081a38cd7e448
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.9.i586.rpm
4c566b558056292cbc8730c6a8275e19
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.15.i586.rpm
8082e95baeadd7527787d7ef960fea3b

Platform Independent:

SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.15.noarch.rpm
b010aa9454cc8b1631fc271148bfc99e

Power PC Platform:

SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-default-2.6.16.27-0.6.ppc.rpm
f7cf4448592556658428a4d6c1f80a26
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-iseries64-2.6.16.27-0.6.ppc.rpm
00d04e7cfbc9b27dc5dca9dcd9c715d2
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-kdump-2.6.16.27-0.6.ppc.rpm
98faf70272be4b6abd887f4d04fc6284
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-ppc64-2.6.16.27-0.6.ppc.rpm
1411437f7005f90d7083d8fb5cad99ce
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-source-2.6.16.27-0.6.ppc.rpm
edbbb370525bfb9caefe22c563b73b7a
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-syms-2.6.16.27-0.6.ppc.rpm
d15067647e646c65245934dc21cf6d13
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/mkinitrd-1.2-106.25.ppc.rpm
5b244ec190ab5e8432d04b286fd595c3
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/multipath-tools-0.4.6-25.14.ppc.rpm
2592ff0cebfee11a54163a86354e9c40
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/open-iscsi-0.5.545-9.16.ppc.rpm
5c6faf58161ef7607c29eafb995698d9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/udev-085-30.16.ppc.rpm
40b7b338af66872ba3ab5cf4b2f0e792

SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.13.ppc.rpm
3f99986f3194d8a6b1dcfa9bc737387a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.13.ppc.rpm
44273fe733fb0f6227fddcc3d93bf723
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.13.ppc.rpm
880f61aa27d2cf85f687b63536f9b76a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.13.ppc.rpm
78995147e37e08ce50e06d9f4b6bdd43
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.13.ppc.rpm
b38cf17b95ffefe1177c5e50b0fb7f5f

x86-64 Platform:

SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-debug-2.6.16.27-0.6.x86_64.rpm
36d4798029d37d58e04d4e088c857d05
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-default-2.6.16.27-0.6.x86_64.rpm
8f8d92d0d3bd28abab96593619f7e110
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-kdump-2.6.16.27-0.6.x86_64.rpm
422a4e7a8330bbefc616acf90cde155c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-smp-2.6.16.27-0.6.x86_64.rpm
b49a2612377a09dcda55bfc7b077559b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-source-2.6.16.27-0.6.x86_64.rpm
0da3b45f9e5c7f679fbb5633baaf0370
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-syms-2.6.16.27-0.6.x86_64.rpm
78de774b4943c716f071e15843c061b7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-xen-2.6.16.27-0.6.x86_64.rpm
3d68e95abd041b2131118b1cff963703
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kexec-tools-1.101-32.20.x86_64.rpm
50b692b9662c0308cd3fb83573a1d10c
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/mkinitrd-1.2-106.25.x86_64.rpm
f48e546e789c3590e617484c38cab9ac
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/multipath-tools-0.4.6-25.14.x86_64.rpm
9cf969cf4bb76b77ae13ebc287908cc9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/open-iscsi-0.5.545-9.16.x86_64.rpm
42c6343b258e4363ccb510f429555857
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/udev-085-30.16.x86_64.rpm
c28d409a7cb6edbc077e0edd5fccf91a

SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.13.x86_64.rpm
194e64a59862dcebba2b7e58818747b4
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.13.x86_64.rpm
3fa5ca85656cb037a72a1d1855d38d7f
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.13.x86_64.rpm
ddb5c45b75d967a52ee39dbd71ffc52e
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.13.x86_64.rpm
ca21f69550373f05fbff08b2c4505203
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.13.x86_64.rpm
a1143a950fe7f50f5664f7a009a0b796
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.13.x86_64.rpm
b6bf0d933792855235b6fe848328f05b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.13.x86_64.rpm
be16a4f55e8e5b69f9677ed9ebee29e9
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.13.x86_64.rpm
0466ac6e4d01edaf3cd702859e4d0f0e

SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.15.x86_64.rpm
e3ccbf0a746cbc8f91a53864c7cc44f4
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.15.x86_64.rpm
df750c05231346c502f54c23a60c67e2
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.15.x86_64.rpm
09e22d0a4b0826687ce68ba535b53d40
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.15.x86_64.rpm
7163a5cc8545db178688d3d23817c375
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.15.x86_64.rpm
6457587a33198b4fcd04b3ed2c99b589
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.15.x86_64.rpm
23a663cd7658a95e02b8fd46b8b3e810

Sources:

SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-bigsmp-2.6.16.27-0.6.nosrc.rpm
b35b46b9331de972842e5869a4944d3f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-debug-2.6.16.27-0.6.nosrc.rpm
e657caa01e2c07019f8cc889777f11b7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-default-2.6.16.27-0.6.nosrc.rpm
eebf35ce636a741f9bc47a2fa382ce76
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-iseries64-2.6.16.27-0.6.nosrc.rpm
d09b683ab819709aadf9ece6b3f3e707
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-kdump-2.6.16.27-0.6.nosrc.rpm
617e45734469b9dd49cd44e1a9e024bc
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-ppc64-2.6.16.27-0.6.nosrc.rpm
197bf280a2b992f24d1827c0d081d8e0
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-smp-2.6.16.27-0.6.nosrc.rpm
0d164685b97350f60bb13b2408b3e0f6
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-source-2.6.16.27-0.6.src.rpm
948af0a9a23e466e00102d1412ca6aea
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-syms-2.6.16.27-0.6.src.rpm
5ab46df57270adabab766f3f08f04f3f
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-um-2.6.16.27-0.6.nosrc.rpm
8a8d3d518e01d9477d4bb11680239d3b
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xen-2.6.16.27-0.6.nosrc.rpm
ef135de71f6434a981bed66f01f3a606
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xenpae-2.6.16.27-0.6.nosrc.rpm
d2145a8c27a2324e0a6bf048c27c8a7e
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kexec-tools-1.101-32.20.src.rpm
07a7cf8799deffdd0f5606ba4c6e6fe7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/mkinitrd-1.2-106.25.src.rpm
8ac081406c2636d27412aa2c41d6cfe8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/multipath-tools-0.4.6-25.14.src.rpm
642fb05f65f4629b60b98d72a3333efe
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/open-iscsi-0.5.545-9.16.src.rpm
f52ea025e7ea1a9e131c13e5a6018775
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/udev-085-30.16.src.rpm
cbd7aa05bc56bbbfed68ea4611ac16dc

SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.8.src.rpm
cea6899a95d45178d21168b6aa4dd922
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.13.nosrc.rpm
98260538fb3afb196a0fb1f52edc00c5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.13.nosrc.rpm
f0a9e177557eb196adba8d19c6e06f4e
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.13.nosrc.rpm
bc5365eda00fd8db053b4dbe16e168c3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.13.nosrc.rpm
72c601464252532948d3ab8ea73b872a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.13.nosrc.rpm
9576c07ca12e6f50e86d0d063cd16df2
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.13.nosrc.rpm
47b3c7e171c000824e42aa594e7681d3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.13.src.rpm
003debda7e60a61eaf01f2798bb1fa65
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.13.src.rpm
9cba4d63d45f4d4c908b137c5e069bb7
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.13.nosrc.rpm
2cfa5afc504eda54df8116c5ce42c23e
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.13.nosrc.rpm
16c0f03172d069271f515dbeb24eb19b

SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.9.src.rpm
f3f522d91ffba19568e1d0fe6142deb9
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.15.nosrc.rpm
24fb636744affbe2f7c96a9140b2def1
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.15.nosrc.rpm
a68261d68dec7866b7b3f2d3b9d6f1f0
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.15.src.rpm
4fa98524a2dbb11d5e8f38f161c79c94
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.15.nosrc.rpm
59936703da3fa4c3f06d709d91a4f05a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.15.src.rpm
a1862d7ee039c35b9dfd2bf61a3396e5
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.15.src.rpm
a0caf67ace3014157e0c0bfcbd1143b6
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.15.nosrc.rpm
c64e46fd270b095a1d57ac9cf1c895ed
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.15.nosrc.rpm
574b65b39dfe4f65fa7d18cdd1b8f2ba
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.9.src.rpm
ebe62382458daba958312b5cde956883
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.9.src.rpm
4ec6d9d84c4f7d606ef699fb3b2ddb23

Our maintenance customers are notified individually. The
packages are offered for installation from the maintenance web:

Novell Linux Desktop 9 for x86

http://support.novell.com/techcenter/psdb/15107fb406dee9a6d661cedc4a7bd068.html

Novell Linux Desktop 9
    http://support.novell.com/techcenter/psdb/15107fb406dee9a6d661cedc4a7bd068.html

    http://support.novell.com/techcenter/psdb/06a879ef6bcde6c750e9ee4e43ccc446.html

Novell Linux Desktop 9 for x86_64
    http://support.novell.com/techcenter/psdb/06a879ef6bcde6c750e9ee4e43ccc446.html

SUSE SLED 10 for AMD64 and Intel EM64T
    http://support.novell.com/techcenter/psdb/aa32c28c0e5ddf716b0e61d93331f86d.html

SUSE SLES 10
    http://support.novell.com/techcenter/psdb/aa32c28c0e5ddf716b0e61d93331f86d.html

    http://support.novell.com/techcenter/psdb/8d1bb2f1def9904433821604ff90783e.html

    http://support.novell.com/techcenter/psdb/dd622f88b5acaa6cb876b101236a952e.html

    http://support.novell.com/techcenter/psdb/87e2c4f32a1d32427f4f6a08a52ff58e.html

    http://support.novell.com/techcenter/psdb/9b70db20ae4e8d5034a104f1305d437c.html

SUSE SLED 10
    http://support.novell.com/techcenter/psdb/aa32c28c0e5ddf716b0e61d93331f86d.html

    http://support.novell.com/techcenter/psdb/9b70db20ae4e8d5034a104f1305d437c.html

SUSE SLED 10 for x86
    http://support.novell.com/techcenter/psdb/9b70db20ae4e8d5034a104f1305d437c.html

SUSE CORE 9 for AMD64 and Intel EM64T
    http://support.novell.com/techcenter/psdb/8256ebb61cc00811a06c0fd252c18d5a.html

SUSE CORE 9 for IBM zSeries 64bit
    http://support.novell.com/techcenter/psdb/dc588035c8569c0fba9c9e33685f698c.html

SUSE CORE 9 for IBM S/390 31bit
    

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis