[kernel-sec-discuss] r1392 - dsa-texts

Dann Frazier dannf at alioth.debian.org
Fri May 29 07:13:37 UTC 2009


Author: dannf
Date: 2009-05-29 07:13:36 +0000 (Fri, 29 May 2009)
New Revision: 1392

Added:
   dsa-texts/2.6.26-15lenny2
Removed:
   dsa-texts/2.6.26-15lenny1
Log:
commit released dsa text

Deleted: dsa-texts/2.6.26-15lenny1
===================================================================
--- dsa-texts/2.6.26-15lenny1	2009-05-22 16:06:32 UTC (rev 1391)
+++ dsa-texts/2.6.26-15lenny1	2009-05-29 07:13:36 UTC (rev 1392)
@@ -1,140 +0,0 @@
-----------------------------------------------------------------------
-Debian Security Advisory DSA-XXXX-1                security at debian.org
-http://www.debian.org/security/                           dann frazier
-May XX, 2009                        http://www.debian.org/security/faq
-----------------------------------------------------------------------
-
-Package        : linux-2.6
-Vulnerability  : denial of service/privilege escalation/sensitive memory leak
-Problem type   : local/remote
-Debian-specific: no
-CVE Id(s)      : CVE-2009-0028 CVE-2009-0834 CVE-2009-0835 CVE-2009-0859
-                 CVE-2009-1046 CVE-2009-1072 CVE-2009-1184 CVE-2009-1192
-                 CVE-2009-1242 CVE-2009-1265 CVE-2009-1337 CVE-2009-1338
-                 CVE-2009-1439
-
-Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a denial of service, privilege escalation or a sensitive
-memory leak. The Common Vulnerabilities and Exposures project
-identifies the following problems:
-
-CVE-2009-0028
-
-    Chris Evans discovered a situation in which a child process can
-    send an arbitrary signal to its parent.
-
-CVE-2009-0834
-
-    Roland McGrath discovered an issue on amd64 kernels that allows
-    local users to circumvent system call audit configurations which
-    filter based on the syscall numbers or argument details.
-
-CVE-2009-0835
-
-    Roland McGrath discovered an issue on amd64 kernels with
-    CONFIG_SECCOMP enabled. By making a specially crafted syscall,
-    local users can bypass access restrictions.
-
-CVE-2009-0859
-
-    Jiri Olsa discovered that a local user can cause a denial of
-    service (system hang) using a SHM_INFO shmctl call on kernels
-    compiled with CONFIG_SHMEM disabled. This issue does not affect
-    prebuilt Debian kernels.
-
-CVE-2009-1046
-
-    Mikulas Patocka reported an issue in the console subsystem that
-    allows a local user to cause memory corruption by selecting a
-    small number of 3-byte UTF-8 characters.
-
-CVE-2009-1072
-
-    Igor Zhbanov reported that nfsd was not properly dropping
-    CAP_MKNOD, allowing users to create device nodes on file systems
-    exported with root_squash.
-
-CVE-2009-1184
-
-    Dan Carpenter reported a coding issue in the selinux subsystem
-    that allows local users to bypass certain networking checks when
-    running with compat_net=1.
-    
-CVE-2009-1192
-
-    Shaohua Li reported an issue in the AGP subsystem they may allow
-    local users to read sensitive kernel memory due to a leak of
-    uninitialized memory.
-
-CVE-2009-1242
-
-    Benjamin Gilbert reported a local denial of service vulnerability
-    in the KVM VMX implementation that allows local users to trigger
-    an oops.
-
-CVE-2009-1265
-
-    Thomas Pollet reported an overflow in the af_rose implementation
-    that allows remote attackers to retrieve uninitialized kernel
-    memory that may contain sensitive data.
-
-CVE-2009-1337
-
-    Oleg Nesterov discovered an issue in the exit_notify function that
-    allows local users to send an arbitrary signal to a process by
-    running a program that modifies the exit_signal field and then
-    uses an exec system call to launch a setuid application.
-
-CVE-2009-1338
-
-    Daniel Hokka Zakrisson discovered that a kill(-1) is permitted to
-    reach processes outside of the current process namespace.
-   
-CVE-2009-1439
-
-    Pavan Naregundi reported an issue in the CIFS filesystem code that
-    allows remote users to overwrite memory via a long
-    nativeFileSystem field in a Tree Connect response during mount.
-
-For the stable distribution (lenny), these problems have been fixed in
-version 2.6.26-15lenny1.
-
-For the oldstable distribution (etch), these problems, where applicable,
-will be fixed in future updates to linux-2.6 and linux-2.6.24.
-
-We recommend that you upgrade your linux-2.6 packages.
-
-Upgrade instructions
---------------------
-
-wget url
-        will fetch the file for you
-dpkg -i file.deb
-        will install the referenced file.
-
-If you are using the apt-get package manager, use the line for
-sources.list as given below:
-
-apt-get update
-        will update the internal database
-apt-get upgrade
-        will install corrected packages
-
-You may use an automated update by adding the resources from the
-footer to the proper configuration.
-
-Debian GNU/Linux 5.0 alias lenny
---------------------------------
-
-Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
-
-XX FILL IN XX
-
-  These changes will probably be included in the stable distribution on
-  its next update.
-
----------------------------------------------------------------------------------
-For apt-get: deb http://security.debian.org/ stable/updates main
-For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
-Mailing list: debian-security-announce at lists.debian.org
-Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Copied: dsa-texts/2.6.26-15lenny2 (from rev 1365, dsa-texts/2.6.26-15lenny1)
===================================================================
--- dsa-texts/2.6.26-15lenny2	                        (rev 0)
+++ dsa-texts/2.6.26-15lenny2	2009-05-29 07:13:36 UTC (rev 1392)
@@ -0,0 +1,558 @@
+----------------------------------------------------------------------
+Debian Security Advisory DSA-1800-1                security at debian.org
+http://www.debian.org/security/                           dann frazier
+May 15, 2009                        http://www.debian.org/security/faq
+----------------------------------------------------------------------
+
+Package        : linux-2.6
+Vulnerability  : denial of service/privilege escalation/sensitive memory leak
+Problem type   : local/remote
+Debian-specific: no
+CVE Id(s)      : CVE-2009-0028 CVE-2009-0834 CVE-2009-0835 CVE-2009-0859
+                 CVE-2009-1046 CVE-2009-1072 CVE-2009-1184 CVE-2009-1192
+                 CVE-2009-1242 CVE-2009-1265 CVE-2009-1337 CVE-2009-1338
+                 CVE-2009-1439
+
+Several vulnerabilities have been discovered in the Linux kernel that
+may lead to a denial of service, privilege escalation or a sensitive
+memory leak. The Common Vulnerabilities and Exposures project
+identifies the following problems:
+
+CVE-2009-0028
+
+    Chris Evans discovered a situation in which a child process can
+    send an arbitrary signal to its parent.
+
+CVE-2009-0834
+
+    Roland McGrath discovered an issue on amd64 kernels that allows
+    local users to circumvent system call audit configurations which
+    filter based on the syscall numbers or argument details.
+
+CVE-2009-0835
+
+    Roland McGrath discovered an issue on amd64 kernels with
+    CONFIG_SECCOMP enabled. By making a specially crafted syscall,
+    local users can bypass access restrictions.
+
+CVE-2009-0859
+
+    Jiri Olsa discovered that a local user can cause a denial of
+    service (system hang) using a SHM_INFO shmctl call on kernels
+    compiled with CONFIG_SHMEM disabled. This issue does not affect
+    prebuilt Debian kernels.
+
+CVE-2009-1046
+
+    Mikulas Patocka reported an issue in the console subsystem that
+    allows a local user to cause memory corruption by selecting a
+    small number of 3-byte UTF-8 characters.
+
+CVE-2009-1072
+
+    Igor Zhbanov reported that nfsd was not properly dropping
+    CAP_MKNOD, allowing users to create device nodes on file systems
+    exported with root_squash.
+
+CVE-2009-1184
+
+    Dan Carpenter reported a coding issue in the selinux subsystem
+    that allows local users to bypass certain networking checks when
+    running with compat_net=1.
+    
+CVE-2009-1192
+
+    Shaohua Li reported an issue in the AGP subsystem they may allow
+    local users to read sensitive kernel memory due to a leak of
+    uninitialized memory.
+
+CVE-2009-1242
+
+    Benjamin Gilbert reported a local denial of service vulnerability
+    in the KVM VMX implementation that allows local users to trigger
+    an oops.
+
+CVE-2009-1265
+
+    Thomas Pollet reported an overflow in the af_rose implementation
+    that allows remote attackers to retrieve uninitialized kernel
+    memory that may contain sensitive data.
+
+CVE-2009-1337
+
+    Oleg Nesterov discovered an issue in the exit_notify function that
+    allows local users to send an arbitrary signal to a process by
+    running a program that modifies the exit_signal field and then
+    uses an exec system call to launch a setuid application.
+
+CVE-2009-1338
+
+    Daniel Hokka Zakrisson discovered that a kill(-1) is permitted to
+    reach processes outside of the current process namespace.
+   
+CVE-2009-1439
+
+    Pavan Naregundi reported an issue in the CIFS filesystem code that
+    allows remote users to overwrite memory via a long
+    nativeFileSystem field in a Tree Connect response during mount.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 2.6.26-15lenny2.
+
+For the oldstable distribution (etch), these problems, where applicable,
+will be fixed in future updates to linux-2.6 and linux-2.6.24.
+
+We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
+
+Note: Debian carefully tracks all known security issues across every
+linux kernel package in all releases under active security support.
+However, given the high frequency at which low-severity security
+issues are discovered in the kernel and the resource requirements of
+doing an update, updates for lower priority issues will normally not
+be released for all kernels at the same time. Rather, they will be
+released in a staggered or "leap-frog" fashion.
+
+Upgrade instructions
+--------------------
+
+wget url
+        will fetch the file for you
+dpkg -i file.deb
+        will install the referenced file.
+
+If you are using the apt-get package manager, use the line for
+sources.list as given below:
+
+apt-get update
+        will update the internal database
+apt-get upgrade
+        will install corrected packages
+
+The following matrix lists additional source packages that were rebuilt for
+compatability with or to take advantage of this update:
+
+                                             Debian 5.0 (lenny)
+     user-mode-linux                         2.6.26-1um-2+15lenny2
+
+You may use an automated update by adding the resources from the
+footer to the proper configuration.
+
+Debian GNU/Linux 5.0 alias lenny
+--------------------------------
+
+Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
+
+Source archives:
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-15lenny2.diff.gz
+    Size/MD5 checksum:  7329571 1bce8a02959ba560840a7ddf3c85d903
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
+    Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-15lenny2.dsc
+    Size/MD5 checksum:     5777 5a7ff16752f5110837e60b4a5c8e9000
+  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+15lenny2.dsc
+    Size/MD5 checksum:     1272 46e99e7c41b6ab88585e915a38834af2
+  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+15lenny2.diff.gz
+    Size/MD5 checksum:    13274 692ffd3b2e648159d13941cffe052413
+  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.26-1um.orig.tar.gz
+    Size/MD5 checksum:    12566 58cd8b7f3a51b2272c9afc10b81551cc
+
+Architecture independent packages:
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-15lenny2_all.deb
+    Size/MD5 checksum:   119468 9ad04974bda322d3bbef07498f30a9d6
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-15lenny2_all.deb
+    Size/MD5 checksum:  1757514 bb327a7a975d8c99f17dfd155a2a72a2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-15lenny2_all.deb
+    Size/MD5 checksum:   104110 bdd9af9837d54a8fb50129861c97dc8f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-15lenny2_all.deb
+    Size/MD5 checksum: 48700438 49386b86f3c839ac6fcdb18bd8c29c04
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-15lenny2_all.deb
+    Size/MD5 checksum:  2261264 29b2eb0593f8a91f2d0ec226d273b9da
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-15lenny2_all.deb
+    Size/MD5 checksum:  4624712 dd7e6ff69cf56f23c60496ff73f7298b
+
+alpha architecture (DEC Alpha)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:   751056 dafcb057c2a435bd9df498619e29e1a7
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:   369566 f56eadc0219fd2a2747b83ba4ab8eacb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum: 28444362 7550723b98c8449b38be12f9878d3778
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:  3608062 b9ef0cc9e5c6d91626182ae4dd6ba8e8
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:   369154 f93e3de04d17cbe97485014d90f3c28c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:   369350 7f2fd6ba761701961161a47a96072689
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:   103660 bdc8b2803a3e66f5359f256270d6f5ae
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum:   103676 ed05e6468ab11308e64166a3ee12e881
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-15lenny2_alpha.deb
+    Size/MD5 checksum: 29151222 870766e5b3f04cf9c035cbeac559938a
+
+amd64 architecture (AMD x86_64 (AMD64))
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   392188 0654ee97b3c916c94e101a28e62b7758
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:  3935410 078ccbf5fd16712f8bf5ff151de046c9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum: 20918522 69de946d1bfb38db74dd37dc11bb77a2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   392818 ab57bec86e9379a94a35e99751905d8b
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:  3852298 9ac3894ba6a9c59c5c246b1cb515088f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   388042 76cc4730e19076a63e7a984581599e82
+  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   103642 96e6f166c99d1345c2532e6128d68b63
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum: 19288550 8e326e2bf136131abca1a3a60ddab9de
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   397950 666585c1b6514caac9513ee0e960e549
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   761832 88fe1a58c498c24ec8ccbe45ae862715
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   103686 fe41064607e75452828b8d9b7ee43e05
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:  3830612 ba30367c79415273f405f7badde67ef7
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum: 20896590 733b6e160bd73635703449966f4014c2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum: 21074418 7bcb629b5c1ab7edd559cfd1518606eb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:  3794626 841fa07f11ebced3f6043398764203c2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:   103652 9d14ba4a406d5c2f54377e9ed9385291
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-15lenny2_amd64.deb
+    Size/MD5 checksum:  1799890 3fbde882e04f90712afab46ceb1d2e4f
+  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+15lenny2_amd64.deb
+    Size/MD5 checksum:  5823978 d57d4ddc15c0c661db45766236aafd1f
+
+arm architecture (ARM)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   357196 61cf0294a78ae1aa4980eadc186b02bf
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum: 11714240 6e461c880ce62f76fc2ae450df65ac7f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:  4135562 934da0c4113cf93379303d7c426b9ec0
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   345872 51a9ca83773967b4fca791ad7304e8b9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum: 11407528 01c0704554c7e5783af0bfe243583b2f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum: 10229940 7cdafb4746b99daf343615abd065b52c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   360706 c0553218a6dc212e6e262f2c5d4e95e9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   362878 063b38690d57b4bed42f47ae6669a205
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   103570 67283a7c868e3b020ea32df43305e6cb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   743442 f032b462f2ced0b29ef8fad467dc53e3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum:   103614 b834c333d52e174cfafa707c1cf6007f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-15lenny2_arm.deb
+    Size/MD5 checksum: 12429986 3e583ab23c35a27a13cb10cc0da581f0
+
+armel architecture (ARM EABI)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   362534 553b5d4a96face61b87a8e072f1f9ff8
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:  4127498 168ff1a45080f3c4cba4a04d1b326b16
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum: 11682088 d75f73e9f4614bfb13de3c73b5b2ae9a
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   744114 76f75b81436e3b3b387e8fd405535dca
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   334058 16bf2ddbe077aef886e30ecd08320792
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum: 12394862 3dcf9c71e56fbd49c1ac8088c2271a67
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   359142 f44a38848367e077d3ab10095695a1f9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   103698 b2db17336a565129e4cd858cfdbebdec
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:  9570956 c1202b4698c40d8ba708227cc463ba75
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   364206 28ac049650ad018de6f30b2f974c335e
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum: 11370938 f1272a12e1fe6bdb4a1e75be8d205c08
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_armel.deb
+    Size/MD5 checksum:   103664 efcc623f3063eab822d32d3392659bb1
+
+hppa architecture (HP PA RISC)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   293774 11f697620d8e797204a9ee43c7e49e86
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   296078 103c08b6d81814a758e70381efbd00cb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum: 17469984 5bf0999276e32dcc44eae2f5dae41c43
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:  3596462 498f39403026997ec7e9bd0daa01ae05
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   103600 b5edaa5c335be330726ef6dbab25bcd8
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum: 16925522 4c7ca20db89d33a0c050165a7ca41533
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   293006 b8543710d9d5eba22a4a1bc6128436d9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   103574 35b0f4350ceb613d3790f054a720a2c7
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   294442 b6ffd162c317e0bd787a6f5db35af295
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum: 16202302 30d4723632168c7a4b1a2b0ebd993c6c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum:   755564 07bda4c6ddbf6a86ff2d37f5faa53a3b
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-15lenny2_hppa.deb
+    Size/MD5 checksum: 15613120 13474e40e538a178556712045a1055c2
+
+i386 architecture (Intel ia32)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   401964 67ca4a3a5e393d5dfc3d72b22c29ac24
+  http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+15lenny2_i386.deb
+    Size/MD5 checksum:  5352762 0492fa26aacea1e90a2a8076f421736d
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20260632 0903069efeb795506c5de03770992c4d
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   382028 04fdd8c04218b0adabedf7255de595dc
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:  3715228 9a34e86a009de2cfce28c65486c435b1
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   395624 e7f8a141fcce18b9175f988961560481
+  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   103638 2e1729b6d848f742b6330e6d5a695a44
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20236806 82db8b2a80d62b4a09d33e83a88750ec
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   395790 b55d97b7a62538cc00f886ea8655e59a
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   396078 58d4fb3d17f32ffdc57a17a3a0e2a647
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20142406 30711aa079af780c44aab9474c404917
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   746566 1044f2f109e75208c88397938b0a793f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   103652 404c334a0703eb5710593c6eade7c2f3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20117418 65608dc1c7f99ab38fcd30a1a4bb06da
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   396930 e589efc8e5b6a5c0649d1b4a9508b477
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20412848 43c86e53ac74b81cd167e59df620c6ae
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 17945358 6bf8a4efc2d3d2af2ed9873f0ed4a940
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:  1589190 20210ab586114583a1227b00e7ddf23c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   384234 86d3c745e0456a25f481c9585becd71f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:  3847862 8177698dda0696e378accfe9c3d3c44f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:  3747978 b25b6df842f713a7736448d91be804a3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   103700 05a3a356d68d4777ed08c8e88e234c17
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:   396910 3b1af51b193bbb723c20f3ff1063a9f6
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20766900 c3d03294fd3777044a6fe908e77ca56e
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum: 20082656 0a700ba7ed7bcf1c94cffe57722c8e77
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-15lenny2_i386.deb
+    Size/MD5 checksum:  3770904 2c20fd09d1b57aceb659b650d2a86c3e
+
+ia64 architecture (Intel ia64)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:  3683456 f8e33d2b49c0dc0f6daaa8c1c5aed6a1
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   352408 9087493ca55454b97152ebf3e12ac027
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum: 34097344 aad5d13c617ffaf5efc31bf3fee5bdbb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   103650 61015b0fb2d786664d340caec9556cb3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   351716 9a1c3c31cedebd60ea0e71a983edbe24
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum: 34176080 7d8b2afa280521af629da3ef6a8dcf96
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum: 33920860 261eab4d401617b4e50d5e9c7fa9478c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   103682 e8ef7422829d57e214062770ee1516fd
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   351762 3c392c2f3ecc09b8794b9c08a6dda4d9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   352368 f63441dda8bf0e1394d4e71531b5c3f6
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum: 33988600 8fc3c10d5f376828d451263e2a5a0411
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:  3651316 fa72532376b07227d336484a5eb9b59c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_ia64.deb
+    Size/MD5 checksum:   745208 bbb6f3e7e0aa49a23b19b0995f458d2b
+
+mips architecture (MIPS (Big Endian))
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum: 29180882 69a83b37e95628c4ca370f1c8ab6e101
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum: 19996594 09ab2685b1d53cd77b9554fbfafed256
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum: 19985912 7de8b500b44f9fc8249944de2146a251
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:  3959292 ccf258221f247d7d6524511d64336422
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   295336 877afd2f578bcfe254d01dbd437c72a3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum: 23319736 ab01e5fb78dc39389364a8284a9fafb8
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   255696 3208d45d1fa1d3bc56452e3715044bde
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   294846 4b8c8611ab3ced1936a21719d0db327e
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   103628 e305aec4b61ee60c5638c64cb85b5f89
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   103572 ac8b9df04d63b2e077590e82a8676e6c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   280168 4462adb08ce8d26bf9856021b814d191
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   349818 e0e3ff2cb9251fca0729f347dfe5ecba
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum: 11427614 ab6594b40bf0ce9a73c0891ba9706cc3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum: 15680942 6d69e713864dd57e7e5c52711ce65f8f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   350770 02fc7e97009a310eab609b34824f0198
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_mips.deb
+    Size/MD5 checksum:   754842 f4f4b879b7a9ff4efb024cf7c81e4c8e
+
+mipsel architecture (MIPS (Little Endian))
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum: 22773614 2f02c916e762ec12aa5e6d940e6942ab
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   346140 f074d0b61aca2a022c1b23b2a9cb31d8
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   103708 7cbdf5c0f7d9091682225139e4019f4a
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   739236 220a8b129147286703e70de980e70010
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum: 19378238 717d741afb1c4d6355bf2912e797b893
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum: 19385536 c743a80e3ab91e52603517987059d062
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   291996 72bd0ee79971f727a22e753de2a79dd2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:  3887460 24f9ebab57d2f336ab2965d75ced8d04
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   103656 7e5a9a9fe6b75f773f7109fdb29c67b2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum: 14885136 b97b282ee0e13f36a0e7ec7ac90fd698
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   291628 97184eef6ab6f4aba03c5756cf817e77
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   346368 9f65a85c3a36a98971295da9eca49ced
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum:   287456 f836716afe5101b627b6d017ee2cf6e3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-15lenny2_mipsel.deb
+    Size/MD5 checksum: 28242940 f848e64d548e0dc0655ff4a1e1efc263
+
+powerpc architecture (PowerPC)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:  3852082 41b6543dcd37c140f2c468d7c7535eed
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum: 23112214 960c8cfb6b15c7cbaf6edd2d4aca9216
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   103666 e2fd64d5aa6c1f98956e62b4a0260d0f
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:  3886868 44038a1babafe461e01dc987d84edf9a
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum: 23389448 f1d0e1e6ed8b15a234c8023bc258149b
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   370398 90e589b7dd6b6a5a2a1e29c204b0ed68
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   370828 c556b7c5ed697ccf57eb6dee79279dfc
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   752742 e8fa3ee09312887d1d11f32d123a50d9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   364504 91840865ed1ed6cc06f7e4141ee9caf6
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum: 23548478 943ab35bb29eb5f16b065f31d98b0f10
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   103692 f69df040dc9fdf8e78517698c15a5550
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   364426 9d91da2c31f69340de4f4fa30e5043ee
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum:   362742 f5cc256d09740470b319faa0acb0bbeb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum: 23341130 8b8bee292a27f65c68ccef929f472629
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-15lenny2_powerpc.deb
+    Size/MD5 checksum: 23515268 8253e09f72830bc475e18382d77e790c
+
+s390 architecture (IBM S/390)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:   226874 012f123cf2a0959a26b3842d4a01a288
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:  7829404 b2db1074fb1f2c946dec0e6e87ff5f92
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:   103648 850c0432d7d078b4626b3be6daab0a28
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:  7768546 35fc35b3b56e41cd84d43f2e77c0b22b
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:  3526832 fa2fb50fa267e35dd7d6800d99639256
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:   226086 2c89451b2fc1bea70667cd0ff95dae91
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:   738472 31dc6942f679a420645a21e0fc0c35e0
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:  7481500 e2375317ca3081bf63a3c97a5b935416
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:  1625802 5160bd9986a171955f3562b75cf354b2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:   228190 5cabeeb5263a026a97facd0ea936b762
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:  3559308 e21511cdf0e9fcb7a252ab44d91b92eb
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-15lenny2_s390.deb
+    Size/MD5 checksum:   103670 3775b5b831d91e73aefaa4e75bfeb002
+
+sparc architecture (Sun SPARC/UltraSPARC)
+
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:   103590 d03c411c9501d10750608b9b79b0cf72
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum: 14479456 98ceecd12b774a3ebb356191d62557a2
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:  3777608 881e0091bbc2885b4affe78a9ae3b07a
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:   297472 1670872dd129ca10da89ef6c9661c460
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum: 14134838 0225ead0cde1eacf5ac523da37a7a679
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:  3812750 f0bb98ba845e2e1b6b196d8015a20718
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:   299968 ddc83f3902293f66791c1cc24345695c
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum: 14459928 fc5eb9d5a238621723ecd3919946cbe9
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:   795946 cb3b7cb116f72dd623a3ed8e7d53e3e3
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:   298804 260d0051895126e78a28510075dc4898
+  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-15lenny2_sparc.deb
+    Size/MD5 checksum:   103566 3d18d81d21f97f8cc79638cfa1ef0090
+
+  These changes will probably be included in the stable distribution on
+  its next update.
+
+---------------------------------------------------------------------------------
+For apt-get: deb http://security.debian.org/ stable/updates main
+For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
+Mailing list: debian-security-announce at lists.debian.org
+Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>




More information about the kernel-sec-discuss mailing list