Re: [SECURITY] [DSA 1794-1] New Linux 2.6.18 packages fix several vulnerabilities
hello,
ist this the same like DSA-1787 / http://www.debian.org/security/2009/dsa-1787
??
i do not see this advisory (1794) @ http://www.debian.org/security
with regards,
mex
2009/5/7 dann frazier <dannf@debian.org>:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - ----------------------------------------------------------------------
> Debian Security Advisory DSA-1794-1 security@debian.org
> http://www.debian.org/security/ dann frazier
> May 6, 2009 http://www.debian.org/security/faq
> - ----------------------------------------------------------------------
>
> Package : linux-2.6
> Vulnerability : denial of service/privilege escalation/information leak
> Problem type : local/remote
> Debian-specific: no
> CVE Id(s) : CVE-2008-4307 CVE-2008-5395 CVE-2008-5701 CVE-2008-5702
> CVE-2008-5713 CVE-2009-0028 CVE-2009-0029 CVE-2009-0031
> CVE-2009-0065 CVE-2009-0322 CVE-2009-0675 CVE-2009-0676
> CVE-2009-0834 CVE-2009-0859 CVE-2009-1192 CVE-2009-1265
> CVE-2009-1336 CVE-2009-1337 CVE-2009-1439
>
> Several vulnerabilities have been discovered in the Linux kernel that
> may lead to denial of service, privilege escalation, or information
> leak. The Common Vulnerabilities and Exposures project identifies the
> following problems:
>
> CVE-2008-4307
>
> Bryn M. Reeves reported a denial of service in the NFS filesystem.
> Local users can trigger a kernel BUG() due to a race condition in
> the do_setlk function.
>
> CVE-2008-5395
>
> Helge Deller discovered a denial of service condition that allows
> local users on PA-RISC to crash the system by attempting to unwind
> a stack containing userspace addresses.
>
> CVE-2008-5701
>
> Vlad Malov reported an issue on 64-bit MIPS where a local user
> could cause a system crash by crafting a malicious binary which
> makes o32 syscalls with a number less than 4000.
>
> CVE-2008-5702
>
> Zvonimir Rakamaric reported an off-by-one error in the ib700wdt
> watchdog driver which allows local users to cause a buffer
> underflow by making a specially crafted WDIOC_SETTIMEOUT ioctl
> call.
>
> CVE-2008-5713
>
> Flavio Leitner discovered that a local user can cause a denial of
> service by generating large amounts of traffic on a large SMP
> system, resulting in soft lockups.
>
> CVE-2009-0028
>
> Chris Evans discovered a situation in which a child process can
> send an arbitrary signal to its parent.
>
> CVE-2009-0029
>
> Christian Borntraeger discovered an issue effecting the alpha,
> mips, powerpc, s390 and sparc64 architectures that allows local
> users to cause a denial of service or potentially gain elevated
> privileges.
>
> CVE-2009-0031
>
> Vegard Nossum discovered a memory leak in the keyctl subsystem
> that allows local users to cause a denial of service by consuming
> all available kernel memory.
>
> CVE-2009-0065
>
> Wei Yongjun discovered a memory overflow in the SCTP
> implementation that can be triggered by remote users, permitting
> remote code execution.
>
> CVE-2009-0322
>
> Pavel Roskin provided a fix for an issue in the dell_rbu driver
> that allows a local user to cause a denial of service (oops) by
> reading 0 byts from a sysfs entry.
>
> CVE-2009-0675
>
> Roel Kluin discovered inverted logic in the skfddi driver that
> permits local, unprivileged users to reset the driver statistics.
>
> CVE-2009-0676
>
> Clement LECIGNE discovered a bug in the sock_getsockopt function
> that may result in leaking sensitive kernel memory.
>
> CVE-2009-0834
>
> Roland McGrath discovered an issue on amd64 kernels that allows
> local users to circumvent system call audit configurations which
> filter based on the syscall numbers or argument details.
>
> CVE-2009-0859
>
> Jiri Olsa discovered that a local user can cause a denial of
> service (system hang) using a SHM_INFO shmctl call on kernels
> compiled with CONFIG_SHMEM disabled. This issue does not affect
> prebuilt Debian kernels.
>
> CVE-2009-1192
>
> Shaohua Li reported an issue in the AGP subsystem they may allow
> local users to read sensitive kernel memory due to a leak of
> uninitialized memory.
>
> CVE-2009-1265
>
> Thomas Pollet reported an overflow in the af_rose implementation
> that allows remote attackers to retrieve uninitialized kernel
> memory that may contain sensitive data.
>
> CVE-2009-1336
>
> Trond Myklebust reported an issue in the encode_lookup() function
> in the nfs server subsystem that allows local users to cause a
> denial of service (oops in encode_lookup()) by use of a long
> filename.
>
> CVE-2009-1337
>
> Oleg Nesterov discovered an issue in the exit_notify function that
> allows local users to send an arbitrary signal to a process by
> running a program that modifies the exit_signal field and then
> uses an exec system call to launch a setuid application.
>
> CVE-2009-1439
>
> Pavan Naregundi reported an issue in the CIFS filesystem code that
> allows remote users to overwrite memory via a long
> nativeFileSystem field in a Tree Connect response during mount.
>
> For the oldstable distribution (etch), this problem has been fixed in
> version 2.6.18.dfsg.1-24etch2.
>
> We recommend that you upgrade your linux-2.6, fai-kernels, and
> user-mode-linux packages.
>
> Note: Debian carefully tracks all known security issues across every
> linux kernel package in all releases under active security support.
> However, given the high frequency at which low-severity security
> issues are discovered in the kernel and the resource requirements of
> doing an update, updates for lower priority issues will normally not
> be released for all kernels at the same time. Rather, they will be
> released in a staggered or "leap-frog" fashion.
>
> Upgrade instructions
> - --------------------
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
>
> The following matrix lists additional source packages that were rebuilt for
> compatability with or to take advantage of this update:
>
> Debian 4.0 (etch)
> fai-kernels 1.17+etch.24etch2
> user-mode-linux 2.6.18-1um-2etch.24etch2
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
> Debian GNU/Linux 4.0 alias etch
> - -------------------------------
>
> Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
>
> Source archives:
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-24etch2.dsc
> Size/MD5 checksum: 5672 29972a87539a76fb5b146470f7b45c39
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-24etch1.diff.gz
> Size/MD5 checksum: 5536652 bf239ac0f2487929933aa0629de64ad7
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-24etch1.dsc
> Size/MD5 checksum: 5672 b92a0d9b93d8ccf430734e0e3cc2fe87
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-24etch2.diff.gz
> Size/MD5 checksum: 5536709 4503d0ff5de1d53b5a672289ed5848f2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
> Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
> http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch2.dsc
> Size/MD5 checksum: 740 b37bc8f75334963c7f0410c2296e77fb
> http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.24etch2.dsc
> Size/MD5 checksum: 892 68d98e1c77c46035a49ff30831b6dde9
> http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch2.tar.gz
> Size/MD5 checksum: 59036 682c3c14e9ef4e7696db50899a02f0b5
> http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz
> Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582
> http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.24etch2.diff.gz
> Size/MD5 checksum: 20663 9fe6e2b6513767676fb005a00cbb71f6
>
> Architecture independent packages:
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-24etch2_all.deb
> Size/MD5 checksum: 3592500 554e5252f25700683aaa6fd5761ef5d8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-24etch2_all.deb
> Size/MD5 checksum: 58160 ae531496950d99a5b992570a1310c52e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-24etch1_all.deb
> Size/MD5 checksum: 1085412 7e893ac7ae22985cb909b597c2f20e8c
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-24etch2_all.deb
> Size/MD5 checksum: 1820912 20119b39b0924aa9f3083450c7be8a85
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-24etch2_all.deb
> Size/MD5 checksum: 41471594 a7fdc8dfc809e1fc276a7b51795fa8dc
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-24etch1_all.deb
> Size/MD5 checksum: 3741774 84b89ad27a37d505a01d762b0747ff2c
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-24etch1_all.deb
> Size/MD5 checksum: 1820466 586a8e99417e2612b5f3d7369e2f94a9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-24etch2_all.deb
> Size/MD5 checksum: 1085068 84281a805dae405a8468175d098b7601
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-24etch2_all.deb
> Size/MD5 checksum: 3742014 7094d10edb64a9abec2edef65928839e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-24etch1_all.deb
> Size/MD5 checksum: 41473576 38c60799be708c352ad9255add42ce3b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-24etch1_all.deb
> Size/MD5 checksum: 58106 17a134e707c201d4a77f1e24a5e2769e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-24etch1_all.deb
> Size/MD5 checksum: 3593118 8b74f3ec8d207f6c73572ab96c8c7395
>
> alpha architecture (DEC Alpha)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 23473934 cbe30f310450bd925914daca5813749a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 23492924 56433c869026af90edf2e676577f8897
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 57504 d0f363f4a0afac56901ba09147a7d9c9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 270400 4946950b6f7a49f71ad402df8b56f727
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 23751458 f515ef33090fbd04e9091fd404698bff
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 270962 81e7337f510dfa7a573311942a2cb0c4
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 270810 9dde43cd10c0c76ce7f95ac1b3c48ee8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 266996 ebdea056276a98aa168ec3f2a8d6fead
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 23546372 d36aae75dfd73bb920e972ed35c51130
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 2977390 cb91566e47051b087818025c09433686
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 266628 2af9e07d8fde05394c77490a56cace39
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 23373164 6da0b86b5624545c57003ad4971a8600
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 23849404 adc61b296e0148d80a36fd5c0cdc398e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 3000958 6495ed75388c161aeea3fe3f234649c2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 266740 ece7d15d812a818fb941bf066c4cf107
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 266510 c8fb5396900faa5fe29617e65b5d1340
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 57590 ce8fde6a4c56b444ffc4169e2c91d8c8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 3057218 4079ceaeec683727d42aa4f0ff039467
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 57556 cfc864cc678ae266f537a5dbf913444d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 23392094 bd229c2a4a5139282f8d56dc5d68db3d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 23442694 2cbff8237013489493619b0bd7b5cb76
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-24etch1_alpha.deb
> Size/MD5 checksum: 57538 eedeb00fdcab4f08f7bd0817972d4a39
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 3032298 5d8d424009fbb14d6a3d7747bc8f2db3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch2_alpha.deb
> Size/MD5 checksum: 271360 1192112c8bad4d8249307d8a04719e0d
>
> amd64 architecture (AMD x86_64 (AMD64))
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 16913766 b9bdf3f150eb989e56defbe20a3a54d8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 3425782 0f9a61fbd2ddeacddc1a284022d20137
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 278846 c157673d8bb21376bc6efaf921a37c3d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 3401184 f7f5fc7c991fc045aaadf74ff0eeb541
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 57496 27388370e87ce060dc4cc73f7f3564aa
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 57584 135a83295850c6cc297f250336b1e336
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 279170 ec156e059a46e69c8bd5213c38b81246
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 57508 326c436e34be9324a7a7945a75b467f5
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 3256172 0f992a332d44244811d4f4667b946131
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 1656524 b8ae89e56a18ba4f5b2d44a95203969f
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 15369608 a45b9cd80f819696489589d03a4a5902
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 1688680 e72bda68ed661e841903e71a5e7d0cdc
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 16954524 f7267352268a0dfbccd1b05ebea495d3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 278736 0bd52f59a1a4976433fa81019916e953
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 57530 37b533587e80bb97fdb1f9e273ef1c71
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 281080 d652716ee66e0df8f1d2e11469bd5df5
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 1688674 61d7baeb6633c615efadffd0c7e9e7a0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 15370384 24eba6725ba7ca279fb3987f5760d84b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 282946 dff25979ef813b6d0737fd9de01388ae
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 15356656 f9d0a81e7c590e86dce1932b0cf0e2ff
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 3425774 7d19e5bd73f7a3e765b3734233688f75
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 57482 ddfbea54419ecf453651522b512f80ad
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 1656508 62c40ab1e29b39c3d0ef016deaf6a99a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 15358578 d6814d7b1e776206cf7a21badb3d151e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 3400906 8b56ec266783cf0c6edf3dada99b05a1
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 3256076 9f704018576440522771ad44dd063745
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 57558 bdbc12099f897600cb0bb7866fcf12a6
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 279258 d8be131fc99940e033b4cc3c8039df24
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 16911938 0d5e9e8c538a399c60fbe7f4ad38e239
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 280758 8ddd0b369532cdcd44383587ba1040e8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 3231962 018b0dfeae9849cd0e28962a5a160048
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 16955372 7d9c63e175ded010ba1f9a1057185ce2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 3231978 f268273c6f5d8753b354919ef3d42ffb
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch2_amd64.deb
> Size/MD5 checksum: 57546 f638083e1a12fe611dbfc0f9b9177ab5
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 282356 4f43f955762f7be01de440d3cbce7f40
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-24etch1_amd64.deb
> Size/MD5 checksum: 57530 191a1e58eeb5ce701ce3605c8bfb13cf
> http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch2_amd64.deb
> Size/MD5 checksum: 5962092 043c2c51d7aa93e1c4a7fd5b056f0e1d
>
> arm architecture (ARM)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 4592620 b5adc2cf2f3b4867bc5f005f5b485d72
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 208512 df79f26c934caf542346b25d6fbced6a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 57626 78c18b7635eff38eeed8c8cda07468a7
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 8875798 2a577a02d18eab3e863afc8b3ae6fc93
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 7572928 45c6ecd8d912d0344c749eb161ac3d75
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 7572984 2a3ff014d8bf13a07de248be7bdefaeb
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 237092 aeeb9a78894e18986599035db9ee9efc
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 5016302 ee7a8fa2c4c33f56362d7b3c4a699313
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 241972 9ff3387ffd1b42b8384488986183b506
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 4592706 f64c33fb5089be94d6e78c374ce086a9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 3414642 49be1eaea5986030f55377333c5de8d9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 236406 3bad5f97981ff15e5552a623945aa41e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 236736 ebc67406b3c643f260d430dc12c2b7cf
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 57580 ea065372d4e83d62536251e678c9c1ec
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 8875796 44d84e7aedbf25c6c10fd53edefc0ef0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 237190 20c7f8b97a2800172fab92a1dde0b215
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 241958 3a5e3dc633d9f5b5d889eb4c2742fa0a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 57632 b1691bed70092c7478f4d0fd184b454b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 57676 06e20417a690515b1e34a03ec55ac6e9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 7928896 ab63947ead7c39d7b060a218eab378d9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 202788 7c96813dac0c6ac27ccbe1ffe47744bf
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 7929028 6f7f1c14998cfe9e4591772d5be3787e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-24etch1_arm.deb
> Size/MD5 checksum: 5016402 ada8901a7d595c2fe9d00a841e872006
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 202868 19a550d4763ce56d68a07222f4013b94
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 207396 3a7de120801525268476a7b6c22e8f84
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_arm.deb
> Size/MD5 checksum: 3414664 b68fdde7a80f3538a3c57b21a920bb16
>
> hppa architecture (HP PA RISC)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 200234 a42025eb492c8cee39a4f9998e3b8582
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 202374 68069764dc95a0cf3a025e9eb22a43ca
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 200272 7b77d41811bcbef1e8033eb93dd67c03
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 11003742 1c6177557357e1f2a8aca8dede898aa8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 3026110 c17d933ab1a987137164b17cc824cc01
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 10562712 eab6c4fb035514db0a3d2013a58e8811
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 11812822 3739d1c70edc836b2b6183c91c64b891
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 57582 0227efab68fe6eba71e9a24707c14a3e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 202348 85844928a7e53875ed65cd8ca9e2564d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 3026082 a6e5f10396429271a3f6af6db3bd2fcd
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 11813274 39a6c61b5750bfbd3af21e20efe10790
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 11003404 2c476e17aadea4d5fe9787fc31bbf270
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 10562896 62a8eeed396f7b0939bc8afcd3fa1b5f
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 202170 c0a87e0bb013b276498bf22784c45cf2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 57610 b94850d5975ec590c4bfd47b7fa92ffa
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 201544 2e8116afb9b090f0e8328ecdf8b721c8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 57656 b4936ba6ac6d07ea688bc309f1a9ecf9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 201206 865306b58d1bb6a51125120b86f623a6
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 11403058 7675c1356f94a0b7a9d3ee73a11ac0fc
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 201116 abba23bc60ba910f881b77e03e253993
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch1_hppa.deb
> Size/MD5 checksum: 11403572 8a70c6799aee1cf84d69db41128b5aa4
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_hppa.deb
> Size/MD5 checksum: 57632 e4c7d6b4040947e3ebfab64731e65d7c
>
> i386 architecture (Intel ia32)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 57550 d1ceaf85ffbab26f6263c1d2a1084628
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 281720 fdfbc017794ba163718541a1c9bcee33
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 3153370 1f3fbdaff2406c79f078121430552b95
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 276026 a72a6f8b4b34ebe811011c05844aa9a3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 3172814 0b15c3215f8c11bb74721ae95d3bbbee
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 14297004 a2c3b3f3bf7fdd96a0956559baf4a575
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 3058734 97ed58c50160f2bc1489183c64faa83f
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 57608 9390abb9a6730f776b0eef14db8d1d15
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 14296618 30e96680a42f3388f547674d83a211b5
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 273904 4546e871056555434d1fb068d46dcc34
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 283582 f7c8322aa914f0d2e1011e8ad90eb511
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 277092 041c0f265fac7dbb870ab13705850cec
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 286424 ea3ab3f5a6d5cebb0839c50d300fbbf6
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16839428 f55d4b7e3ad16b770e4f872d6002938c
> http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch2_i386.deb
> Size/MD5 checksum: 5510668 f6318da68f755fb149d3e4b7345a5454
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 283488 034e2db0c65bdf8356de66933dbe18dc
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 57554 3c4263a6bb304f46306985eec6da76e7
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16342612 16a822f4a4cc910bf4ef2ca154d80db6
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 282614 69948ea58a5f3e023bd2f7e9334f5206
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 283292 a609e8c75751bd23f93ea8c9c9805862
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 275714 7d20932e6e8a9defb771762dec8c2cf8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 3175260 cdd0199e4a2deb3384babde08fff29ed
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 281854 2b8b7cb1cf824259ef5bca51dd7e6e9e
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 57554 25d25e9c76e48d90abdc6dc4fa98dc36
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 275626 c69d4bb7338689bc1c1034c72a73552a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16839160 3abb3b88db3261585f1107b816d7e73b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16478602 406b982ea69b3fbf60f05bc79aeb01c3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16414150 8980f62d059c08ee4715b4f840251c4a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 285546 20fddef08d809bd62618dba1170b2443
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16516304 98127faa1288680196802d80a2e516b0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 283196 39cf1e20d4fa1be5dc81639f80cc53da
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16342464 492956ec0bfb3a9348de483af93358e0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16413914 16e9f9a184d734ff9ba72cf448d9e006
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16195640 ac590b14fea2c14933773e7acd8ee2e9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 16384758 275b6551ea309a85247c8269a2ca131f
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 1303760 6c21475aca4f6840bfd6ecf72ca07ddf
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16195636 512976a3d50729b684e101f3d436d0f1
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 57498 3ad4d448a82a79bee90d020a1a3efd4c
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 283614 9958a5555871c3b55395a3811e2ba16a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 3175062 760a09051d4c6f159d94ab61ce46d3e2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 283278 d181a3c6b7e2b45338452652e9788f81
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 3153590 d06c74e964ddb8e06e57149237cb0e13
> http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.24etch2_i386.deb
> Size/MD5 checksum: 25602218 a43ee679786a92ff8600c6a8e7fb036c
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 14284348 654f88dc30ab167b523c06c860268d2b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16516566 db353533d7e7d533225e99bd8fd6ddf1
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 57482 a6ab58ab8b3cfa2dce6f49521b7a1f5b
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 57538 1eac10fb9251c8242e06bc9b15cbc8a6
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16385264 488399c28192c835a772e1e6763254ba
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 14284744 138457c64958da10328a9bc662518f47
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 1331760 e977207f31a617418114c629310a0a64
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 3173012 9abba6a99f0c83bf508b490883ebd27c
> http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 57490 d98a55e25eebbf20315792e2da604cbd
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 16478822 86cd8edc1f2224fb9186b07cc63c0f30
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 3058924 6df6c7ce3239c160c836b30b0cb850a4
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 1303686 6b4cb561ccf0ae8b692505a83a62c1c3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch1_i386.deb
> Size/MD5 checksum: 273704 a48288dec2bbd3e4eaf297891a82e2ac
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 282232 15d0b97ca171af915931e43445323401
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch2_i386.deb
> Size/MD5 checksum: 1331834 911ed2ea38e95a8459ce6eb00461c67a
>
> ia64 architecture (Intel ia64)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 3086288 8159d8247b8439aad32be09747c44ed3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 259050 c4dabe17057799266a806ee9f49c1d01
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 259026 fe551aa81737ae7562ea613074687159
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 259020 da3cf312b5d0ce8bc59ab152134c7e10
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 57576 beedcbe1cbf4c9ff2eead5e7dd5bbeaa
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 28191326 75be5f2b0b5d9dde291d7fc3f75a3c01
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 57558 f29ab34edb09fbf0cf460a52d900cb86
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 28189032 5b2684d4dafbcc34e077e76367f99d7d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 57518 53097da6759f5dbf720ed6741d5dfc31
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 259028 dcecde4739f9e7091b498c55d543de61
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 3086420 1715deb979b2fd128a404017c51199ad
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 28022512 2f7150f069fe10314be8366b6f33c80a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-24etch2_ia64.deb
> Size/MD5 checksum: 28021554 15888059ada25a1df53ea1e06f98cc43
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_ia64.deb
> Size/MD5 checksum: 57498 ff2147d4b9d86a7104049004a75d0b0b
>
> mips architecture (MIPS (Big Endian))
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 57556 c55b8f2b6c058ac2e8e977a244a8ca0e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 9057908 930211393dd0eae186413bf64d1ad929
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 166366 b8ed836c7b52a7473b5442cf34571932
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 8290842 c1e26a281edabea12127297eb6908cce
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 186218 998e71301c0e570eaea5f89d4c14bc94
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 186040 f55f16820c5ee432380103be8d3b98a4
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 162948 6aa24c824d9bdc46a9b2e3ec9206ca56
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 3353852 dd5151c5ba373421c1d73414f7635050
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 6099320 91a09240e52a5e253432b48f18340018
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 15630942 226ef41a01e8321d063b11ef3cdd71ac
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 153842 3f0980845300200bb42ebc17e50da882
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 57602 e3259b68bbd8f112ac288d964b67735f
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch2_mips.deb
> Size/MD5 checksum: 15661864 50e4498ba1db7b799a4a943964d7dba4
>
> mipsel architecture (MIPS (Little Endian))
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 15071130 7b47b1248592c27110f95d8433df14ba
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 57612 36149a3f699bd3a27812379659d63797
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 181876 f88c97af7dc565fadf445df63cf63092
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 15046026 d91a6917a024bb53f1409038b7a5da7d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 5950792 bdc92871276e840c831b6608d7580b35
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 159122 f289f1bdd1042dfd137c28ebdbb4fdc0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 186138 de5ba3faa0cf39eb70d1a901382af660
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 153884 56ab7e619af304890feb104ae0031ae0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 57558 e5579bb41376ef237efd5b1d1beeec8e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 3354246 e271a853595718667ad9ee92b640a945
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 9864850 38643aac81245db2bd4e3ad2e8187d43
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 5930606 bc44903ec933088611bbab35eae7d0a6
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 185890 8a76b425da8f9bd843445ab402e9c369
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 6037172 6e7d261fbebb9cb6b3d7420f030d57e0
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-24etch2_mipsel.deb
> Size/MD5 checksum: 159120 49606ba4ec3b9dc3891a8db70dd32248
>
> powerpc architecture (PowerPC)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 255646 cb3a8874c18a6e4e91181880a6c9b85c
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 16410114 ba833fa8dd87cfc4b4b8f6c69a4c45ab
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 249724 e83692d6b13eaf23e53d9ca8bcb619dd
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 3419496 627c21fbdb9350be0b4cbc808d696f59
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 257626 459bc8e3abd033aa341780557a5e5467
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 233010 391c104f5ffc427f003f55366ccb26ca
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 16975346 a1cf3eb6652bf9cf5d921aee20eb7679
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 257372 19c2286c4d82b40ee3d1eab8b47a1a70
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 18365660 d3a96656b0d4e60217fa4e32bf613efb
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 18316678 855d8c6664fcd4f0fc485a2254b434fa
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 3396976 ae6f8c9d11c5cefbd55a79a0065b95e9
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 16634246 82837cc8be152a2eaad04864534b1354
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 256610 fafe406336be7d5a72c95f5ed4434486
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 17016040 aab904f4de994ac02f6767d787aaa2d7
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 57556 a0961152b7c461bcf46838598f337fa2
> http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch2_powerpc.deb
> Size/MD5 checksum: 3371096 4ed778de0fe58e4e575f2009b1b21a68
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 15164166 48f27600af451a81ed8f439ead2d9094
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 57506 309dcf0bb0093626145bb5a3dbbcd313
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-24etch1_powerpc.deb
> Size/MD5 checksum: 256318 dd09e9ab9b0b55e6242fd43d39ca52b0
>
> s390 architecture (IBM S/390)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 1444792 65cf6d54d1864fa9593cc1d7bd48e32c
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 5670236 9ffbaf35ad540ef7943246cff5f56d9e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 57550 c31a56e819cdca9d8f683756e86d6e3b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 5408924 23205928ae2570fa9de9d918a92bbffe
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 57498 f9ec34fbabdcd47e82bdebfd5c61b5d1
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 148582 ed576121635601eb13f9b1b5b18df158
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 2970576 cb9ff5de4f159be26adb77a1654f9c38
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 5670086 bb6b939d4ee4055d1414e9ee820debde
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 1444844 687c959498ff8554892b1d980ffbcc18
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 5626962 c4292f4eb21a43815f1f034a925b0590
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 57520 099be07a236cfc4990717731bf08139d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 2970532 9d1668579f9a9eb745a44d08b30007da
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 2947446 3e27023a055fdd774b3289b045b7c1a8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 5408972 f39e7ee9bd84c2d635d96cb0716abdd8
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 5626908 b1ab2c5891fd1c69b2a14438130f3e4a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 147404 78db167dea1715c9c2fb9c639078da6e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 2947568 a4e433116e8eb0fc50b0f845daeb30d2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 57572 ebb8c12ec07403944bdda2ea032eb658
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 147488 0be2b32820585b651699c20c895c187e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 147840 83572cbe27afda0438768888f54afbd5
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch2_s390.deb
> Size/MD5 checksum: 148648 4d7696585231987d7b1d0b89206aa3bf
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-24etch1_s390.deb
> Size/MD5 checksum: 147812 5b5ec24eb7a1e503e54d1b826d4320f7
>
> sparc architecture (Sun SPARC/UltraSPARC)
>
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 57658 85d8d9e4220d714f035fdba3945f8a5b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 10749234 c315a6732b4bdc1f2a933a3ab7f70f61
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 10704988 5c8aa657f6e753d564ce28cd5233a870
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 3225012 8b647ba8e8683c216d38d2f65b44c986
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 10441342 67341cf21ca33af97e28a2f50816868d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 10752862 fe7ffe1779f19ed125fe457ff72e2ebf
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 173194 5005c744ca39613c7947209667085ec3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 3229378 ec4511d40a9462de41990c6760af6d4d
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 6453010 a78d12a91fcaa85d0934fc2c9475156e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 57578 80adaf839f84cc7e7c9848165c280225
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 172678 39720fa936c578899ddac4170d3114f2
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 206042 38a98a8b604c552c907ad00ba3d16e2e
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 10447546 b75fd20c483fd0952ef441cd8ce3fcf3
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 10707914 fc789353ab59d224287ccc565cdcb03a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 6463760 392d2db88951658128f7abfd7f8cdb70
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 204844 c7d684a559e09da6d714e71411af18ac
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 203610 f2d365cdbe7b2caf090588c125d8b17a
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 205708 4b0f45ae23fc2f0ad3936a9c076c6f0b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 57630 9dcc5865c37f2d750da37fc7b4c0f7bc
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 3254264 3897f034a6c8cfc24d683a0816718ed1
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 204240 2e04c9fccacef2761c4fd3608fdae318
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch2_sparc.deb
> Size/MD5 checksum: 3249626 fe045b931d67788a718c2040ef440a21
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 204924 da40e61d358b209497bf4c720121154b
> http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-24etch1_sparc.deb
> Size/MD5 checksum: 57608 7ce928a49a6c81ab639c4dce82429bab
>
> These changes will probably be included in the oldstable distribution on
> its next update.
>
> - ---------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ oldstable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security dists/oldstable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
>
> iD8DBQFKAhuEhuANDBmkLRkRAgAqAKCPqCHTY2/R+6U3/EX8JrUByNTTVgCePpFA
> Fz+cbwaJDuoVsf7uDjw5eYs=
> =TaC5
> -----END PGP SIGNATURE-----
>
>
>
> --
> To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>
>
Reply to: