---

Advisories, March 26, 2006

Debian GNU/Linux


Debian Security Advisory DSA 1017-1 [email protected]
http://www.debian.org/security/
Dann Frazier, Simon Horman
March 23th, 2006 http://www.debian.org/security/faq


Package : kernel-source-2.6.8
Vulnerability : several
Problem-Type : local/remote
Debian-specific: no
CVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457
CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800
CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055
CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356
CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806
CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858
CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096
CVE-2006-0482 CVE-2006-1066
Debian Bug : 295949 334113 330287 332587 332596 330343 330353
327416

Several local and remote vulnerabilities have been discovered in
the Linux kernel that may lead to a denial of service or the
execution of arbitrary code. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2004-1017

Multiple overflows exist in the io_edgeport driver which might
be usable as a denial of service attack vector.

CVE-2005-0124

Bryan Fulton reported a bounds checking bug in the coda_pioctl
function which may allow local users to execute arbitrary code or
trigger a denial of service attack.

CVE-2005-0449

An error in the skb_checksum_help() function from the netfilter
framework has been discovered that allows the bypass of packet
filter rules or a denial of service attack.

CVE-2005-2457

Tim Yamin discovered that insufficient input validation in the
zisofs driver for compressed ISO file systems allows a denial of
service attack through maliciously crafted ISO images.

CVE-2005-2490

A buffer overflow in the sendmsg() function allows local users
to execute arbitrary code.

CVE-2005-2555

Herbert Xu discovered that the setsockopt() function was not
restricted to users/processes with the CAP_NET_ADMIN capability.
This allows attackers to manipulate IPSEC policies or initiate a
denial of service attack.

CVE-2005-2709

Al Viro discovered a race condition in the /proc handling of
network devices. A (local) attacker could exploit the stale
reference after interface shutdown to cause a denial of service or
possibly execute code in kernel mode.

CVE-2005-2800

Jan Blunck discovered that repeated failed reads of
/proc/scsi/sg/devices leak memory, which allows a denial of service
attack.

CVE-2005-2973

Tetsuo Handa discovered that the udp_v6_get_port() function from
the IPv6 code can be forced into an endless loop, which allows a
denial of service attack.

CVE-2005-3044

Vasiliy Averin discovered that the reference counters from
sockfd_put() and fput() can be forced into overlapping, which
allows a denial of service attack through a null pointer
dereference.

CVE-2005-3053

Eric Dumazet discovered that the set_mempolicy() system call
accepts a negative value for it’s first argument, which triggers a
BUG() assert. This allows a denial of service attack.

CVE-2005-3055

Harald Welte discovered that if a process issues a USB Request
Block (URB) to a device and terminates before the URB completes, a
stale pointer would be dereferenced. This could be used to trigger
a denial of service attack.

CVE-2005-3180

Pavel Roskin discovered that the driver for Orinoco wireless
cards clears it’s buffers insufficiently. This could leak sensitive
information into user space.

CVE-2005-3181

Robert Derr discovered that the audit subsystem uses an
incorrect function to free memory, which allows a denial of service
attack.

CVE-2005-3257

Rudolf Polzer discovered that the kernel improperly restricts
access to the KDSKBSENT ioctl, which can possibly lead to privilege
escalation.

CVE-2005-3356

Doug Chapman discovered that the mq_open syscall can be tricked
into decrementing an internal counter twice, which allows a denial
of service attack through a kernel panic.

CVE-2005-3358

Doug Chapman discovered that passing a 0 zero bitmask to the
set_mempolicy() system call leads to a kernel panic, which allows a
denial of service attack.

CVE-2005-3783

The ptrace code using CLONE_THREAD didn’t use the thread group
ID to determine whether the caller is attaching to itself, which
allows a denial of service attack.

CVE-2005-3784

The auto-reaping of childe processes functionality included
ptraced-attached processes, which allows denial of service through
dangling references.

CVE-2005-3806

Yen Zheng discovered that the IPv6 flow label code modified an
incorrect variable, which could lead to memory corruption and
denial of service.

CVE-2005-3847

It was discovered that a threaded real-time process, which is
currently dumping core can be forced into a dead-lock situation by
sending it a SIGKILL signal, which allows a denial of service
attack.

CVE-2005-3848

Ollie Wild discovered a memory leak in the icmp_push_reply()
function, which allows denial of service through memory
consumption.

CVE-2005-3857

Chris Wright discovered that excessive allocation of broken file
lock leases in the VFS layer can exhaust memory and fill up the
system logging, which allows denial of service.

CVE-2005-3858

Patrick McHardy discovered a memory leak in the
ip6_input_finish() function from the IPv6 code, which allows denial
of service.

CVE-2005-4605

Karl Janmar discovered that a signedness error in the procfs
code can be exploited to read kernel memory, which may disclose
sensitive information.

CVE-2005-4618

Yi Ying discovered that sysctl does not properly enforce the
size of a buffer, which allows a denial of service attack.

CVE-2006-0095

Stefan Rompf discovered that dm_crypt does not clear an internal
struct before freeing it, which might disclose sensitive
information.

CVE-2006-0096

It was discovered that the SDLA driver’s capability checks were
too lax for firmware upgrades.

CVE-2006-0482

Ludovic Courtes discovered that get_compat_timespec() performs
insufficient input sanitizing, which allows a local denial of
service attack.

CVE-2006-1066

It was discovered that ptrace() on the ia64 architecture allows
a local denial of service attack, when preemption is enabled.

The following matrix explains which kernel version for which
architecture fix the problems mentioned above:

  Debian 3.1 (sarge)
Source 2.6.8-16sarge2
Alpha architecture 2.6.8-16sarge2
AMD64 architecture 2.6.8-16sarge2
HP Precision architecture 2.6.8-6sarge2
Intel IA-32 architecture 2.6.8-16sarge2
Intel IA-64 architecture 2.6.8-14sarge2
Motorola 680×0 architecture 2.6.8-4sarge2
PowerPC architecture 2.6.8-12sarge2
IBM S/390 architectur 2.6.8-5sarge2
Sun Sparc architecture 2.6.8-15sarge2

The following matrix lists additional packages that were rebuilt
for compatability with or to take advantage of this update:

  Debian 3.1 (sarge)
kernel-latest-2.6-alpha 101sarge1
kernel-latest-2.6-amd64 103sarge1
kernel-latest-2.6-hppa 2.6.8-1sarge1
kernel-latest-2.6-sparc 101sarge1
kernel-latest-2.6-i386 101sarge1
kernel-latest-powerpc 102sarge1
fai-kernels 1.9.1sarge1
hostap-modules-i386 0.3.7-1sarge1
mol-modules-2.6.8 0.9.70+2.6.8+12sarge1
ndiswrapper-modules-i386 1.1-2sarge1

We recommend that you upgrade your kernel package immediately
and reboot the machine. If you have built a custom kernel from the
kernel source package, you will need to rebuild to take advantage
of these fixes.

This update introduces a change in the kernel’s binary
interface, the affected kernel packages inside Debian have been
rebuilt, if you’re running local addons you’ll need to rebuild
these as well.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc

      Size/MD5 checksum: 874
a35d48f0d5b6c679b5130fb3aaa647cb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz

      Size/MD5 checksum: 14256
7c44e2e875b7995f5bb14effb5684b7d
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc

      Size/MD5 checksum: 1004
f98203872db1017d6053ababb496116d
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz

      Size/MD5 checksum: 1015096
0bb501098f732e6750e3413f4e9d148f
    http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz

      Size/MD5 checksum: 43929719
0393c05ffa4770c3c5178b74dc7a4282
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc

      Size/MD5 checksum: 896
caa3c2d1f06666c61ba31917a3c26b1f
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz

      Size/MD5 checksum: 2396
d71945b6f493574ce0d360de316f1873
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc

      Size/MD5 checksum: 685
54417bc7eddc5722e0f5ce734e67edb9
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz

      Size/MD5 checksum: 1954
1cdaccf68580892b42cd88b5c5b03b9b
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc

      Size/MD5 checksum: 786
e99a3432c467f4f76e9b6e852333a9c5
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz

      Size/MD5 checksum: 2123
d90ea9aa1ccb9ad3041d5d3b20894330
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc

      Size/MD5 checksum: 813
e860fc8f679fdedb3817d09e25c77b66
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz

      Size/MD5 checksum: 2055
3fb20a5238ac6dc6a84ba67a887d752e
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc

      Size/MD5 checksum: 621
c8d489fa28bd6b65bd3bda1a460d8a08
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz

      Size/MD5 checksum: 24387
25e9d10a881601e9329291faf5110b55
    http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc

      Size/MD5 checksum: 993
6cd9024b61b9a6cf4862e204d330b9a3
    http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz

      Size/MD5 checksum: 2661
d7bf35beb4924d8dab10b08380e9e289
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc

      Size/MD5 checksum: 862
9d55e1790bcc518f315b44a52ed331bc
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz

      Size/MD5 checksum: 2286
1e9932ed547a85a43b82c10ac9b11800
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc

      Size/MD5 checksum: 1047
8fa892195f50896a45f4a2c64f66ce11
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz

      Size/MD5 checksum: 89240
5987c1e4d49bb7b3159f3a42b22d1e4f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc

      Size/MD5 checksum: 1008
9c8bbaf47e657e4ac707c6f35cee0f2e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz

      Size/MD5 checksum: 65886
0f42b0e9fc22cd2d5eb615d8f4f6922d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc

      Size/MD5 checksum: 1103
df823aaf30d2d39f51762abf0fdab8e4
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz

      Size/MD5 checksum: 74018
415ea9bd8c15a343646a762c7ecbeb2c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc

      Size/MD5 checksum: 812
3689bf78b872510caeaeaefe3a76b477
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz

      Size/MD5 checksum: 37429
69216b4fe13afb383e5559e4100439ff
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc

      Size/MD5 checksum: 1071
f1d5f3c6a58c3b2efbecb6f481bc6e13
    http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz

      Size/MD5 checksum: 25410
78cd732eb81df1bae3f513eb68aa95c0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc

      Size/MD5 checksum: 1191
8a58beb88416f8235e0ccf91b94bda5e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz

      Size/MD5 checksum: 62533
d3a0fd97437e9eb69f07b5297246610b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc

      Size/MD5 checksum: 833
aa306a38d5cf9f45e601633d239f868e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz

      Size/MD5 checksum: 11437
2c70d8408f9656fba114ee59f22cb44b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc

      Size/MD5 checksum: 1036
b2db64932de00311794a14eaded25ec3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz

      Size/MD5 checksum: 22798
9d94f73ab654770fc251125e1332b2be
    http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc

      Size/MD5 checksum: 703
f5c46506673becb263a62307591041b9
    http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz

      Size/MD5 checksum: 4326
f6191f77c2f41e397e47b727b30d1f64
    http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc

      Size/MD5 checksum: 1092
926d84df8f84a7c9cc68add4fee27427
    http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz

      Size/MD5 checksum: 2273
896ab1f6cbb18b1afd092845b8e12523
    http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc

      Size/MD5 checksum: 894
97a270d1e39bfd032314dc3171831846
    http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz

      Size/MD5 checksum: 1782
1c5a70ee63b83630319152768b924a98

Alpha architecture:

    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb

      Size/MD5 checksum: 1980
0f1542a109fbe036fb8af44e20397299
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb

      Size/MD5 checksum: 1980
d75c152fdab411ad8184ba6331015dcd
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb

      Size/MD5 checksum: 1980
69be478f2fa35a994c02a4f3b450a60e
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb

      Size/MD5 checksum: 1990
3ca05863dcaa11c43c0c7d4c29e4ddfd
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb

      Size/MD5 checksum: 2757876
e94cdb8d12552d293018c7ca24199f47
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb

      Size/MD5 checksum: 230608
fdf2cc6f010f2b618672422c3293f3b9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb

      Size/MD5 checksum: 225502
2a21bf8197792a789420b1838526186f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb

      Size/MD5 checksum: 2758214
0ecffff87c9a03f6f19147c61a5fc48b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb

      Size/MD5 checksum: 230730
3b29ce53073ac08216153a5d6e4b629e
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb

      Size/MD5 checksum: 225634
316c8d48a8a59da90707fb03e2149bc0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb

      Size/MD5 checksum: 20226800
f627945f7f8216fbe6961a9559766f29
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb

      Size/MD5 checksum: 20068720
7aa6c0137c94e2e7ee45e5ae702cfe27
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb

      Size/MD5 checksum: 20218454
9d8030373efb6dc3e2dfded09cf5c0d5
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb

      Size/MD5 checksum: 20068918
710fee78a9ffbde5694b71af50e0060c

AMD64 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb

      Size/MD5 checksum: 2104
ef0b887f5fbe7a50eb29b9f758f4dbe7
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb

      Size/MD5 checksum: 2112
99fc45919e4e99c75b9c9caa96892684
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb

      Size/MD5 checksum: 2110
56ce795b6f72a01261f554d7f80e17f7
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb

      Size/MD5 checksum: 2126
687cd2d07a2216bd06b3e7167c34429a
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb

      Size/MD5 checksum: 2122
80b347bd1c3b75ba8e6019eb4515131d
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb

      Size/MD5 checksum: 2158
593b2f6857005238309652f1ed07b025
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb

      Size/MD5 checksum: 2166
c195509461a3829a88149ecb25dbcd3a
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb

      Size/MD5 checksum: 2172
d87ecb48ff4c9706e28bee9b5e523f0d
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb

      Size/MD5 checksum: 2218
28145de5465f3149b0fb7182c07e2dbb
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb

      Size/MD5 checksum: 2248
a709d2651b5bc6f16a46e482513ffd7c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 2719948
51945c8ba3e5d86f81df067f73225201
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 224276
33205d1399f5df2dce3583f737fb528a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 223300
bb55484a26b5a9a3fc01b68af37af569
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 219178
010a7d13b9c5546006b736caddcfb1b9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 221054
c3674ad6b1c88ae5aa1c36c732fe1fe0
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 217440
22ab9501c6422fd3b160e27bf7a59d2d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 2720186
0db767733816d0a1d4a5e9840348532b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 224506
7b32141a97738499376939faf694b031
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 223506
3461e58701032b00a0340f931af02325
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 219164
e3841dd8bc0d6a326a2b186a2febe880
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 221058
aa43b631e5516324f5e357a50bf03919
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 217500
181e3fa415a02835b62dc538562650bb
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 12558694
a27949d59b7d84a4638ddb91a273ef47
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 13250392
9c8f5ebcb94dd1509f46c4056d0555be
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 13210004
b701fd7c35dccc26dfaba57183de5c2d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 13058704
1ac0827d7d189589c92f6e9cf07def85
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb

      Size/MD5 checksum: 13042396
f41bf487053ea369d2ba635d7c2bb03c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 12560178
13c61c6f63e666a2da9d35e9b4b829b3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 13251702
4a87624ae820a7fef519660321ccd002
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 13213610
6f574e36cbe1c9adbac496968998d389
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 13061358
d9bdb5fdcd2ca14594b4c4eeb0ec4e95
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb

      Size/MD5 checksum: 13044562
61005d327a9ea9efed46625e79710689

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb

      Size/MD5 checksum: 2106
fcb23b2830bed29439b86f0174bc36b0
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb

      Size/MD5 checksum: 2126
4261e8ea28972c4b1a0328491c142e9d
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb

      Size/MD5 checksum: 2114
3a59ea468ed72766258d4c6d4ca721d9
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb

      Size/MD5 checksum: 2134
bfbd467ce5c19e5e1909beb867da57c6
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb

      Size/MD5 checksum: 2130
8c3cb8de73fecb230bf869dce2e92e9b
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb

      Size/MD5 checksum: 2160
3fdac05d7afc2d522191b8672310e3bb
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb

      Size/MD5 checksum: 2168
78248b7c5024afdd3e8bcf8f3b85fdd0
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb

      Size/MD5 checksum: 2180
33dbe8a50cd2deb102b2c26c3451cb0d
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb

      Size/MD5 checksum: 2228
8f87a7c45040d6192c7dd7521719bb84
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb

      Size/MD5 checksum: 2250
0220661e0e1c24c0248a54ed13f93e96
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb

      Size/MD5 checksum: 2150
f710e37e9e5af100ef65b167020739ca
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb

      Size/MD5 checksum: 2184
0dcabd1f69fe86bb1d431f193d032a5d
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb

      Size/MD5 checksum: 2248
88dbce576e5ec5b484085f0e7f204b1c
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb

      Size/MD5 checksum: 2160
459222cd722e8c592fef62a5e64d2e29
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb

      Size/MD5 checksum: 2228
a528e1e7db01a3280a2bab86383f8f9e
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb

      Size/MD5 checksum: 2152
64f8938c4ccf9a567ace8906474a3a05
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb

      Size/MD5 checksum: 2182
3fc7225f53712469830cb60404598287
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb

      Size/MD5 checksum: 2252
97cc65172e9583cf0299c68e53b2dbc3
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb

      Size/MD5 checksum: 2164
cbd1dd8a0dc39c35598c131e0473ce46
    http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb

      Size/MD5 checksum: 2232
5a55c3acad554351348c2c4bbe9347b9
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb

      Size/MD5 checksum: 11986970
3f1f1b972c9aea7e324d3f16252c1a14
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 2777236
af649947c652a9486461b92bbc33be8a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 256920
88db1b684f215fdd35de0989f148b57f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 254646
553205bb17cfc57f4c4a7aadff46650a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 251590
51ebd6202b7f347f66df0e189b2a3946
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 254818
746967059979238eb49cfdcba572c07b
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 251708
33a61355c7a48d87b7570b772e454760
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 2777384
1bb1a12e5057dff0213af9d62e204e1a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 256932
4ffede1559073c0fac6256ebf6bf0fa2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 254820
e24193f1e1a4e0f19e4f6dea078b94a3
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 251726
9afbac1038d98e6377a02ff6aebb3441
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 254918
e32f308990db81bff7295a4724dfa23a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 251742
c4ad3e4f52e907067a44f25214b6b34f
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 14058198
fd607b13caf99093ef31071ff7395d6d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 15531820
5871afdf04de65bda6f5eb3266b0621d
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 15339250
f3ab94a1304a28732cea6be8dd871ac7
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 15258514
cc888a3d69727d61b86a7f0945a51eff
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 15118194
fb0e7f6b830b7a012f06bf7c25ff15cc
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 14064090
7801ebccc8aaa6cbdf94b8f97c017f17
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 15534482
11587d9502f913721dde8c98fef3b676
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 15343922
cc4689243c7fc2134bb4b6e89e44668a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 15260668
839c21112982d20f38b3f4ebc6337cb9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 15120180
3c0e8d9f3df47a5588618bdd0c0529f9
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 2719920
0984a4d0f8de19308e49bc822b2d7c71
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 224274
4faa8c6ee4aceae2ea01a2398c433599
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 223264
298ec2bb85e50e58b4e0ba131648e1b2
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 219174
d7422d17926f1e654627e08a71a8da94
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 220996
0433d7f8f2ce52acde87fd1518b1987c
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb

      Size/MD5 checksum: 217432
f34fb2bc6f9986cc94b002385392ff98
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 2720230
12790a80072f9691a6aebfae99d2884a
    http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb

      Size/MD5 checksum: 224370
288b4255fa05983bedd12c2787159713
  &

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis