Eye of GNOME 2.22.2  

Posted by Daniela Mehler

Eye of GNOME 2.22.2 has been released

"This is the second maintenance release of Eye of GNOME (EOG) in the 2.22 stable line. It has some small bug fixes, cleanups and translation updates.

* What is it ?
=============

Eye of GNOME (EOG) is the image viewer for the GNOME desktop.


* What's changed in 2.22.2 ?
===========================

Bug fixes:

- #527798, compile warnings (Claudio Saavedra)
- #530102, Doesn't register support for compressed svg (Franklin Piat)
- #531300, fails to start up due to lcms error (Felix Riemann)

New and updated translations:

- Petr Kovar, Lucas Lommer (bug #517967)
- Arangel Angov, Jovan Naumovski

* Where can I get it ?
=====================

Source code:

http://download.gnome.org/sources/eog/2.22/eog-2.22.2.tar.gz
md5sum: c2a5daa73edd360cd1fd41027b66fa77

http://download.gnome.org/sources/eog/2.22/eog-2.22.2.tar.bz2
md5sum: 897eddc3534a44276f966963a0fe7c5e"
>>Eye of GNOME 2.22.2


GARNOME 2.23.2
Orca v2.22.2

DSA 1588-2: New Linux 2.6.18 packages fix several vulnerabilities  

Posted by Daniela Mehler

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
Debian Security Advisory DSA-1588-2 security@debian.org
http://www.debian.org/security/ dann frazier
May 30, 2008 http://www.debian.org/security/faq
- ----------------------------------------------------------------------

Package : linux-2.6
Vulnerability : denial of service
Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2007-6712 CVE-2008-1615 CVE-2008-2136 CVE-2008-2137

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a denial of service. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2007-6712

Johannes Bauer discovered an integer overflow condition in the hrtimer
subsystem on 64-bit systems. This can be exploited by local users to
trigger a denial of service (DoS) by causing the kernel to execute an
infinite loop.

CVE-2008-1615

Jan Kratochvil reported a local denial of service condition that
permits local users on systems running the amd64 flavor kernel
to cause a system crash.

CVE-2008-2136

Paul Harks discovered a memory leak in the Simple Internet Transition
(SIT) code used for IPv6 over IPv4 tunnels. This can be exploited
by remote users to cause a denial of service condition.

CVE-2008-2137

David Miller and Jan Lieskovsky discovered issues with the virtual
address range checking of mmaped regions on the sparc architecture
that may be exploited by local users to cause a denial of service.

For the stable distribution (etch), this problem has been fixed in version
2.6.18.dfsg.1-18etch5.

This updated advisory adds the linux-2.6 build for s390 and the fai-kernels
build for powerpc which were not yet available at the time of DSA-1588-1.

We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

The following matrix lists additional source packages that were rebuilt for
compatability with or to take advantage of this update:

Debian 4.0 (etch)
fai-kernels 1.17+etch.18etch5
user-mode-linux 2.6.18-1um-2etch.18etch5

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc
Size/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc
Size/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz
Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz
Size/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz
Size/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz
Size/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc
Size/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c

Architecture independent packages:

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 54138 e7252716146d76ec712aa139287db245
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 15355064 384131032d56063c896019e39e037a96
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274730 da10935f2b25722252c68761e5065405
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb
Size/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e

arm architecture (ARM)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb
Size/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 277982 6242067c054616623741facb41be96b7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb
Size/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 3082082 d279733263714c558f68651a532950d0

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 54186 24256be3de335798d64096467935c740
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_powerpc.deb
Size/MD5 checksum: 3366930 17db3e15c6d8cf2d8aca17939ca4cc22

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 143830 1b86a1ffa2bf8b743ef2608433a01d19
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 5402208 c05f1464684c5755dfd5c5e91b3cf2d8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 2943090 da0829d97b73d6a03242822237d00694
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 54106 fc387ee63680dc3a38ffd915fecc2fd8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 1438980 c6e90fb394da315b633c09be3f4aa53b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 2966156 d6a5e7edfa9424a613a4da2f54b487c4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 5619846 bebebe67bf3bceefd8730dcb19b8fc0a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 144730 7e2da310413f3224915663349e37f752
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 143378 bb59c0b53f875d201529ae52d310ba56
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 5661458 90e536af2b788da136062798aa933d30
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch5_s390.deb
Size/MD5 checksum: 54126 ea1dc6ca830658f681a3ce6b66cfc58b

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 3190524 3e8e5ea3e72da553d2716dd73f0a5fb7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 10647606 9ec3d7c71c0a503b4294aa780a9fdd09
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 54110 f011e208c98ce3aeeaf9dd00ad82b6dd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 6411008 58c2219a0c20105cf239e323da2e0340
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 165004 ebcd3a274a921148a884d50eb71fb2c5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 194096 ce1428b814293647a6e00c947270b813
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 195024 4c4ff026f91be55c689b43a19060620d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 10692826 1053f11e2d543a6c56f9f80f31dc28af
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 54140 46c81fa9576fa5e3ac9200115527f02a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 195748 32499d6fc1f632ec879464002dceb221
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 3168216 d78356180bcbe48cc6ac77a980e08e9d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 10391204 8cb2fa5bd484dff88cab8741035128df

These changes will probably be included in the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIQHOWhuANDBmkLRkRApNNAJ4q0cDO7lz9Ea6jI7v8ndn3csvHKwCfV88x
R+d4u+pfRhh/Dc0jm7stHJY=
=cBJB
-----END PGP SIGNATURE-----
"


DSA 1580-1: New phpgedview packages fix privilege escalation
DSA 1577-1: New gforge packages fix insecure temporary files

samba (SSA:2008-149-01)  

Posted by Daniela Mehler

New samba packages are available for Slackware 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, and -current to fix a security issue:

"Specifically crafted SMB responses can result in a heap overflow in the Samba client code. Because the server process, smbd, can itself act as a client during operations such as printer notification and domain authentication, this issue affects both Samba client and server installations."

This flaw affects Samba versions from 3.0.0 through 3.0.29.

More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105
Here are the details from the Slackware 12.1 ChangeLog:
+--------------------------+
patches/packages/samba-3.0.30-i486-1_slack12.1.tgz:
Upgraded to samba-3.0.30.
This is a security release in order to address CVE-2008-1105 ("Boundary
failure when parsing SMB responses can result in a buffer overrun").
For more information on the security issue, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/samba-3.0.30-i486-1_slack10.0.tgz

Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/samba-3.0.30-i486-1_slack10.1.tgz

Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/samba-3.0.30-i486-1_slack10.2.tgz

Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/samba-3.0.30-i486-1_slack11.0.tgz

Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/samba-3.0.30-i486-1_slack12.0.tgz

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/samba-3.0.30-i486-1_slack12.1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-3.0.30-i486-1.tgz


MD5 signatures:
+-------------+

Slackware 10.0 package:
2af7aaf16a310355e18b62e3cca532ab samba-3.0.30-i486-1_slack10.0.tgz

Slackware 10.1 package:
eaa84d1a5246cc8e10d3bd80de60df82 samba-3.0.30-i486-1_slack10.1.tgz

Slackware 10.2 package:
f20bbc463452f867edb58adb346168f3 samba-3.0.30-i486-1_slack10.2.tgz

Slackware 11.0 package:
6f547d788b0e3459bae593c5d7a31160 samba-3.0.30-i486-1_slack11.0.tgz

Slackware 12.0 package:
69d751c4affb27fd93ea80aab094417a samba-3.0.30-i486-1_slack12.0.tgz

Slackware 12.1 package:
45721736e34bc9a18018c492817fddf7 samba-3.0.30-i486-1_slack12.1.tgz

Slackware -current package:
9baa5b1893735a9335b3371a84b0545f samba-3.0.30-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg samba-3.0.30-i486-1_slack12.1.tgz

Restart Samba:
# sh /etc/rc.d/rc.samba restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key



RHSA-2008:0289-01 Critical: samba security update

DSA 1588-1: New Linux 2.6.18 packages fix several vulnerabilities  

Posted by Daniela Mehler

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
Debian Security Advisory DSA-1588-1 security@debian.org
http://www.debian.org/security/ dann frazier
May 27, 2008 http://www.debian.org/security/faq
- ----------------------------------------------------------------------

Package : linux-2.6
Vulnerability : denial of service
Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2007-6712 CVE-2008-1615 CVE-2008-2136 CVE-2008-2137

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a denial of service. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2007-6712

Johannes Bauer discovered an integer overflow condition in the hrtimer
subsystem on 64-bit systems. This can be exploited by local users to
trigger a denial of service (DoS) by causing the kernel to execute an
infinite loop.

CVE-2008-1615

Jan Kratochvil reported a local denial of service condition that
permits local users on systems running the amd64 flavor kernel
to cause a system crash.

CVE-2008-2136

Paul Harks discovered a memory leak in the Simple Internet Transition
(SIT) code used for IPv6 over IPv4 tunnels. This can be exploited
by remote users to cause a denial of service condition.

CVE-2008-2137

David Miller and Jan Lieskovsky discovered issues with the virtual
address range checking of mmaped regions on the sparc architecture
that may be exploited by local users to cause a denial of service.

For the stable distribution (etch), this problem has been fixed in version
2.6.18.dfsg.1-18etch5.

Builds for linux-2.6/s390 and fai-kernels/powerpc were not yet available at
the time of this advisory. This advisory will be updated as these builds
become available.

We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

The following matrix lists additional source packages that were rebuilt for
compatability with or to take advantage of this update:

Debian 4.0 (etch)
fai-kernels 1.17+etch.18etch5
user-mode-linux 2.6.18-1um-2etch.18etch5

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, and sparc.

Source archives:

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc
Size/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc
Size/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz
Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz
Size/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz
Size/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz
Size/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc
Size/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c

Architecture independent packages:

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb
Size/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 54138 e7252716146d76ec712aa139287db245
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb
Size/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 15355064 384131032d56063c896019e39e037a96
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 274730 da10935f2b25722252c68761e5065405
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb
Size/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb
Size/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e

arm architecture (ARM)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb
Size/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb
Size/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb
Size/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 277982 6242067c054616623741facb41be96b7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c
http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb
Size/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb
Size/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb
Size/MD5 checksum: 3082082 d279733263714c558f68651a532950d0

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 54186 24256be3de335798d64096467935c740
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb
Size/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb
Size/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb
Size/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 3190524 3e8e5ea3e72da553d2716dd73f0a5fb7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 10647606 9ec3d7c71c0a503b4294aa780a9fdd09
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 54110 f011e208c98ce3aeeaf9dd00ad82b6dd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 6411008 58c2219a0c20105cf239e323da2e0340
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 165004 ebcd3a274a921148a884d50eb71fb2c5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 194096 ce1428b814293647a6e00c947270b813
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 195024 4c4ff026f91be55c689b43a19060620d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 10692826 1053f11e2d543a6c56f9f80f31dc28af
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 54140 46c81fa9576fa5e3ac9200115527f02a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 195748 32499d6fc1f632ec879464002dceb221
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 3168216 d78356180bcbe48cc6ac77a980e08e9d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb
Size/MD5 checksum: 10391204 8cb2fa5bd484dff88cab8741035128df

These changes will probably be included in the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIPD45huANDBmkLRkRAi5BAJsHnGiFMDJb1rkp/QJ38cRAhAB1xgCeIL0I
ctecy+cP3sK3xsDYTxot1Ug=
=Vl8h
-----END PGP SIGNATURE-----
"


DSA 1580-1: New phpgedview packages fix privilege escalation
DSA 1577-1: New gforge packages fix insecure temporary files

RHSA-2008:0289-01 Critical: samba security update  

Posted by Daniela Mehler

A new update is available for Red Hat Enterprise Linux. Here the announcement:
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Critical: samba security update
Advisory ID: RHSA-2008:0289-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0289.html
Issue date: 2008-05-28
CVE Names: CVE-2008-1105
=====================================================================

1. Summary:

Updated samba packages that fix a security issue are now available for Red
Hat Enterprise Linux 4.5 Extended Update Support.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4.5.z - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 4.5.z - i386, ia64, x86_64

3. Description:

Samba is a suite of programs used by machines to share files, printers, and
other information.

A heap-based buffer overflow flaw was found in the way Samba clients handle
over-sized packets. If a client connected to a malicious Samba server, it
was possible to execute arbitrary code as the Samba client user. It was
also possible for a remote user to send a specially crafted print request
to a Samba server that could result in the server executing the vulnerable
client code, resulting in arbitrary code execution with the permissions of
the Samba server. (CVE-2008-1105)

Red Hat would like to thank Alin Rad Pop of Secunia Research for
responsibly disclosing this issue.

Users of Samba are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bugs fixed (http://bugzilla.redhat.com/):

446724 - CVE-2008-1105 Samba client buffer overflow

6. Package List:

Red Hat Enterprise Linux AS version 4.5.z:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/4AS-4.5.z/en/os/SRPMS/samba-3.0.10-2.el4_5.3.src.rpm

i386:
samba-3.0.10-2.el4_5.3.i386.rpm
samba-client-3.0.10-2.el4_5.3.i386.rpm
samba-common-3.0.10-2.el4_5.3.i386.rpm
samba-debuginfo-3.0.10-2.el4_5.3.i386.rpm
samba-swat-3.0.10-2.el4_5.3.i386.rpm

ia64:
samba-3.0.10-2.el4_5.3.ia64.rpm
samba-client-3.0.10-2.el4_5.3.ia64.rpm
samba-common-3.0.10-2.el4_5.3.i386.rpm
samba-common-3.0.10-2.el4_5.3.ia64.rpm
samba-debuginfo-3.0.10-2.el4_5.3.i386.rpm
samba-debuginfo-3.0.10-2.el4_5.3.ia64.rpm
samba-swat-3.0.10-2.el4_5.3.ia64.rpm

ppc:
samba-3.0.10-2.el4_5.3.ppc.rpm
samba-client-3.0.10-2.el4_5.3.ppc.rpm
samba-common-3.0.10-2.el4_5.3.ppc.rpm
samba-common-3.0.10-2.el4_5.3.ppc64.rpm
samba-debuginfo-3.0.10-2.el4_5.3.ppc.rpm
samba-debuginfo-3.0.10-2.el4_5.3.ppc64.rpm
samba-swat-3.0.10-2.el4_5.3.ppc.rpm

s390:
samba-3.0.10-2.el4_5.3.s390.rpm
samba-client-3.0.10-2.el4_5.3.s390.rpm
samba-common-3.0.10-2.el4_5.3.s390.rpm
samba-debuginfo-3.0.10-2.el4_5.3.s390.rpm
samba-swat-3.0.10-2.el4_5.3.s390.rpm

s390x:
samba-3.0.10-2.el4_5.3.s390x.rpm
samba-client-3.0.10-2.el4_5.3.s390x.rpm
samba-common-3.0.10-2.el4_5.3.s390.rpm
samba-common-3.0.10-2.el4_5.3.s390x.rpm
samba-debuginfo-3.0.10-2.el4_5.3.s390.rpm
samba-debuginfo-3.0.10-2.el4_5.3.s390x.rpm
samba-swat-3.0.10-2.el4_5.3.s390x.rpm

x86_64:
samba-3.0.10-2.el4_5.3.x86_64.rpm
samba-client-3.0.10-2.el4_5.3.x86_64.rpm
samba-common-3.0.10-2.el4_5.3.i386.rpm
samba-common-3.0.10-2.el4_5.3.x86_64.rpm
samba-debuginfo-3.0.10-2.el4_5.3.i386.rpm
samba-debuginfo-3.0.10-2.el4_5.3.x86_64.rpm
samba-swat-3.0.10-2.el4_5.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4.5.z:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/4ES-4.5.z/en/os/SRPMS/samba-3.0.10-2.el4_5.3.src.rpm

i386:
samba-3.0.10-2.el4_5.3.i386.rpm
samba-client-3.0.10-2.el4_5.3.i386.rpm
samba-common-3.0.10-2.el4_5.3.i386.rpm
samba-debuginfo-3.0.10-2.el4_5.3.i386.rpm
samba-swat-3.0.10-2.el4_5.3.i386.rpm

ia64:
samba-3.0.10-2.el4_5.3.ia64.rpm
samba-client-3.0.10-2.el4_5.3.ia64.rpm
samba-common-3.0.10-2.el4_5.3.i386.rpm
samba-common-3.0.10-2.el4_5.3.ia64.rpm
samba-debuginfo-3.0.10-2.el4_5.3.i386.rpm
samba-debuginfo-3.0.10-2.el4_5.3.ia64.rpm
samba-swat-3.0.10-2.el4_5.3.ia64.rpm

x86_64:
samba-3.0.10-2.el4_5.3.x86_64.rpm
samba-client-3.0.10-2.el4_5.3.x86_64.rpm
samba-common-3.0.10-2.el4_5.3.i386.rpm
samba-common-3.0.10-2.el4_5.3.x86_64.rpm
samba-debuginfo-3.0.10-2.el4_5.3.i386.rpm
samba-debuginfo-3.0.10-2.el4_5.3.x86_64.rpm
samba-swat-3.0.10-2.el4_5.3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFIPT3VXlSAg2UNWIIRAtsZAJ0cVISthJMXoiZuLOelKm3N/hHYiACfVQzJ
pvZ3dbagE61N2RKJ0MCHpIw=
=xsKf
-----END PGP SIGNATURE-----
"


CESA-2008:0288 Critical CentOS 3 x86_64 samba - security update
RHSA-2008:0270-01 Important: libvorbis security update

CESA-2008:0288 Critical CentOS 3 x86_64 samba - security update  

Posted by Daniela Mehler

CentOS Errata and Security Advisory CESA-2008:0288

samba security update for CentOS 3 x86_64:
https://rhn.redhat.com/errata/RHSA-2008-0288.html

The following updated file has been uploaded and is currently syncing to the mirrors:

x86_64:
updates/x86_64/RPMS/samba-3.0.9-1.3E.15.i386.rpm
updates/x86_64/RPMS/samba-3.0.9-1.3E.15.x86_64.rpm
updates/x86_64/RPMS/samba-client-3.0.9-1.3E.15.x86_64.rpm
updates/x86_64/RPMS/samba-common-3.0.9-1.3E.15.i386.rpm
updates/x86_64/RPMS/samba-common-3.0.9-1.3E.15.x86_64.rpm
updates/x86_64/RPMS/samba-swat-3.0.9-1.3E.15.x86_64.rpm

source:
updates/SRPMS/samba-3.0.9-1.3E.15.src.rpm

You may update your CentOS-3 x86_64 installations by running the command:

yum update samba\*


RHSA-2008:0289-01 Critical: samba security update

Via unveils "Nano" processors  

Posted by Daniela Mehler

Via unveils

Via Technologies has announced the first processors based on its new x86-compatible "Isaiah" micro-architecture. The "Nano" processors are pin-compatible with Via's existing C7 processor family, and occupy similar power and footprint envelopes, while doubling or quadrupling performance, Via claims.

(Click here for a larger view of the Via Nano)


Via will continue selling C7 and Eden chip lines, which are based on the company's Esther architecture. The new Nano parts add a much faster, yet still pin-compatible option for OEMs and motherboard vendors, Via says. Glenn Henry, CEO of Via's CenTaur processor division, explained, "The C7, our current product, is very mature, and very good at what it does. So, we thought, if we're going to do a new processor, we should push the performance up a lot."

Both the Esther and Isaiah microarchitectures were designed by Via's Austin, Tex. based CenTaur chip unit, headed up by Henry, a former IBM engineering fellow. Prior to Isaiah, Esther and all of Via's previous architectures used in-order execution -- similar to Intel's new Atom processors -- for the lowest power and size requirements. Isaiah steps up to an out-of-order execution pipeline, similar to Intel's Core Duo architecture, while also adding support for the 64-bit architectures now used by Intel and AMD, for SSE-3 media processing instructions, and for Intel's VTX architecture for VMs (virtual machines). "We're already running the Linux kernel VM and Xen on it," Henry boasted.

Via unveils


A block diagram of the Via Nano

The Nano processors, ranging in clock speeds from 1.0GHz to 1.8GHz, will be available in an L-series ("low-power") for mainstream desktop and mobile PC systems, and in a U-series ("ultra-low-power") for mini-notebooks and small form factor devices. Socket-compatible with C7 parts, they'll obviously use the same 21mm x 21mm nanoBGA2 package. However, Nano parts are being manufactured by Fujitsu using a 65nm process, rather than by IBM on 90nm process technology, as with the C7.

Henry said he expects Nano processors to outperform Intel's Atom chips, while offering greater compatibility with existing three-chip chipset designs. Observing that Atom chips work only with Intel's Poulsbo companion chip, a combination north-/south-bridge chip, he said, "We have two products that are plug-compatible. Intel has a totally different approach, with discreet products so that it does not cannibalize its high-margin products."

Comparing a 1GHz C7 processor to the new 1GHz Nano, Henry said both could run fanlessly, with TDPs (thermal dynamic power) below about 5 Watts. Yet, he expects the Nano chip to perform 200 to 400 percent faster. "Performance will double on most things, with floating-point performance increasing three to four times. We worked on that a lot because, frankly, our multimedia performance [in Esther] was not that good," Henry admits.

Noting that the Nano's power consumption is not drastically different from similarly clocked C7 parts, Via released figures suggesting that Nano chips perform significantly faster. For example, a 1.8GHz Nano was 2.4 times faster than a 1.8GHz C7 on the OfficeBench 2007 rating of Microsoft Office applications performance. Similarly, it ran 1.9 times faster running Adobe Photoshop filters and doing Windows Media encoding, as measured by the PC WorldBench 6 test. Finally, it ran the "ALU Power Performance" test in the SiSoft Sandra XIIc suite 3.2 times faster. The charts below, supplied by Via, tell the tale.

Via unveils


A conceptual diagram of Via's Nano architecture
As the above conceptual picture illustrates, the Nano processors include pipelines that fetch x86 instruction bytes and translate them into micro-ops. The x86 instructions and micro-ops proceed in program order down the top left ("in-order") portion of the pipeline. The "speculative" label refers to the fact that the processor may not be actually fetching the correct program instructions (in cases of a branch misprediction, for example). "Out-of-order" issue and execution happens when the pipeline components take the translated micro-ops and issue them to the appropriate execution units. This happens whenever inputs are available, not necessarily in program order.

According to Via, the Nanos' L2 cache is designed to support a wide variety of sizes with minimal implementation effort. In addition, the L2 cache is "exclusive," meaning that L1 cache contents do not reside in it. This effectively increases L2 cache size compared to "competitor architectures" with inclusive caches, Via says. At the same time, the architecture was designed for multi-core, multiprocessing friendliness, Via says.

Touting the Nano's "significant emphasis on high-performance floating-point execution," Via says the processor can execute four floating-point adds and four floating-point multiplies every clock. A "completely new algorithm for floating-point results in the lowest floating-point add latency of any x86 processor," the company said, in a whitepaper about the Isaiah architecture. In addition, the integer data path for SIMD integer (SSEx) instructions is 128-bits wide, and almost all SSEx instructions (including all shuffles) execute in only one clock.

All this means that the Nano processor can provide "exceptionally smooth playback of Blu-ray and other HD video formats," with encrypted media streams of up to 40Mbps. When combined with an appropriate discrete graphics card, the Nano provides "silky smooth rendering of 3D images," says Via.

Power consumption

As noted earlier, the Nano processors feature TDPs ranging from a high of 25.5 Watts, to a low of five Watts. In addition to "the latest x86 instruction-level power controls," the CPUs include a new "C6" power state in which the caches are flushed, internal state is saved, and the core voltage is turned off, the company says.

Claiming that Intel CPUs must stop their bus and processor execution while changing from one P-state (performance/voltage state) to another, Via says the Nano can achieve such transitions while keeping everything running. Using another unique mechanism, the Nano can automatically adjust the P-state voltage based on the processor's die temperature, according to the company.

Availability

According to Via, Nano processors are available now for OEMs and motherboard vendors. Systems featuring the CPUs are expected to come to market in the third quarter. Since the parts are pin-compatible with C7/Eden processors, a wide array of development boards should support them, although Via has not yet announced any. Still, Via's marketing chief, Richard Brown, promised, "We'll see Mini-ITX boards around the Nano fairly quickly."


Wind River, Intel tag-team “infotainment” Linux
World’s cheapest Linux-based laptop?

DSA 1589-1: New libxslt packages fix execution of arbitrary code  

Posted by Daniela Mehler

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1589-1 security@debian.org
http://www.debian.org/security/ Steve Kemp
May 28, 2008 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : libxslt
Vulnerability : buffer overflow
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2008-1767
Debian Bug : 482664

It was discovered that libxslt, an XSLT processing runtime library,
could be coerced into executing arbitrary code via a buffer overflow
when an XSL style sheet file with a long XSLT "transformation match"
condition triggered a large number of steps.

For the stable distribution (etch), this problem has been fixed in version
1.1.19-2.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.24-1.

We recommend that you upgrade your libxslt package.


Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

http://security.debian.org/pool/updates/main/libx/libxslt/libxslt_1.1.19.orig.tar.gz
Size/MD5 checksum: 2799906 622e5843167593c8ea39bf86c66b8fcf
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt_1.1.19-2.dsc
Size/MD5 checksum: 849 27df832e1c58fa0b4ee2fc08ae23eb52
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt_1.1.19-2.diff.gz
Size/MD5 checksum: 149924 3135ddae6ed99518ca98cb6dd32f9cf5

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_alpha.deb
Size/MD5 checksum: 107220 cb23c0170e99f97ba4a6328b6c15d4e8
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_alpha.deb
Size/MD5 checksum: 131268 264ec9a09e6fd46eb6acb82b6e2e458f
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_alpha.deb
Size/MD5 checksum: 690048 6af24b16a70e3eda53cf9b01aeb72abe
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_alpha.deb
Size/MD5 checksum: 362862 b0bfc373c7b2b029bdecc32fe3c6b393
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_alpha.deb
Size/MD5 checksum: 230516 c613baf2799aca2b10f704c72d65f6dd

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_amd64.deb
Size/MD5 checksum: 131736 bd359cba79ae664919f1d28bb7ee7bb9
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_amd64.deb
Size/MD5 checksum: 630600 9f2ce6f099ad058ddb7756c6bec0ad04
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_amd64.deb
Size/MD5 checksum: 225362 6fad243b75ab8773edac788ae83ff0b2
http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_amd64.deb
Size/MD5 checksum: 106520 86122035aa23a3ac883a90f2ad206cb3
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_amd64.deb
Size/MD5 checksum: 360490 43bf746a2e2d510dc2b42bce0ebfe846

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_arm.deb
Size/MD5 checksum: 126438 8d9a6a49d04b7b718ea4891090590ebe
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_arm.deb
Size/MD5 checksum: 213174 5a22f4ddde902b9e62b320d595c717e4
http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_arm.deb
Size/MD5 checksum: 106410 fa92dc9b78ddafc576c917dc634850f7
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_arm.deb
Size/MD5 checksum: 344476 84490df6ef91ef8d59397efd08141adb
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_arm.deb
Size/MD5 checksum: 612866 b755daf391dc131cec3cf5170f7ff3ef

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_hppa.deb
Size/MD5 checksum: 132206 246544f21eb977706164148ac110fef4
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_hppa.deb
Size/MD5 checksum: 656512 278e6530497e001b7af16b8c97259640
http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_hppa.deb
Size/MD5 checksum: 107496 3c104b63b086ee54e45796cf8f8f5736
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_hppa.deb
Size/MD5 checksum: 238066 ec3a5a9b5ed19d8cea6e207b94960b06
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_hppa.deb
Size/MD5 checksum: 359052 99da4dbb694efd07fec538b0dfba57da

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_i386.deb
Size/MD5 checksum: 215768 065db1534d256efaa0bdbed1d5bc2efa
http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_i386.deb
Size/MD5 checksum: 106010 d736922f8f98e3655e0d17c47c182911
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_i386.deb
Size/MD5 checksum: 610254 7d2f1de6b328363d404e0167b2c3d0b2
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_i386.deb
Size/MD5 checksum: 127542 036211c64911322aad9f5afa3c67a8ce
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_i386.deb
Size/MD5 checksum: 350172 fbd79c2f46affc6a6daea73b95c5fe4c

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_ia64.deb
Size/MD5 checksum: 110354 a086d9e71e7152286ff25d6c28d1c188
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_ia64.deb
Size/MD5 checksum: 688004 a39cdbeb7e2bec2db123baf9fb936141
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_ia64.deb
Size/MD5 checksum: 286602 c417da9ebd63d8338401253df1194e01
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_ia64.deb
Size/MD5 checksum: 361472 3643ac55a03571fa185c4e0700298e82
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_ia64.deb
Size/MD5 checksum: 135176 9cdb256571bf9606ed56840a1e88ddb4

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_mips.deb
Size/MD5 checksum: 106622 5f3f9bff564736decdac2c69983211a0
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_mips.deb
Size/MD5 checksum: 213366 128a0294b6a09059fedb618371ec9d09
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_mips.deb
Size/MD5 checksum: 650424 55eab53a1978e3e2a7c1f7dbd68fc04c
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_mips.deb
Size/MD5 checksum: 128934 3d52f0f986dd862e8119eabeca944e35
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_mips.deb
Size/MD5 checksum: 371998 8f2ea540fd91ca75559d8589c8855de7

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_mipsel.deb
Size/MD5 checksum: 213564 c405f7eef65b01491758e64551b7977f
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_mipsel.deb
Size/MD5 checksum: 624640 9d2b59c3820eb9c99671399f967e0f3e
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_mipsel.deb
Size/MD5 checksum: 363788 09bdf35805a2de68a4d1dfe15c28dcfc
http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_mipsel.deb
Size/MD5 checksum: 106668 2633adeeddc2edc4e36e45a7e4e92c2f
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_mipsel.deb
Size/MD5 checksum: 128564 c768001b8441118205f9f513af83e485

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_powerpc.deb
Size/MD5 checksum: 611678 3d3acc7b7be03bd0bb2e31dcadf05720
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_powerpc.deb
Size/MD5 checksum: 365012 94f6735cc42e233a67fd46df084120ee
http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_powerpc.deb
Size/MD5 checksum: 108104 bca54d59be466884a5cfde0532a324df
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_powerpc.deb
Size/MD5 checksum: 222790 12aef46d1088d93375ab824b73702bc2
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_powerpc.deb
Size/MD5 checksum: 130124 37bb5353c81ed15374acc7305cc54839

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_s390.deb
Size/MD5 checksum: 106798 0a96df71e63deb7d7124aab48152a5df
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_s390.deb
Size/MD5 checksum: 131712 89e70e2d2fadd7b7ec9268d907a62d29
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_s390.deb
Size/MD5 checksum: 226596 751b28fafff17f6fcb8b2f4c0df370c0
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_s390.deb
Size/MD5 checksum: 601572 85051174031d0ff2c22fb87d1ab759c0
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_s390.deb
Size/MD5 checksum: 357722 661c9551483bf52573e52646aaa13b60

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/libx/libxslt/xsltproc_1.1.19-2_sparc.deb
Size/MD5 checksum: 106330 e6c23ad0752b3c7c22857c935befb984
http://security.debian.org/pool/updates/main/libx/libxslt/python-libxslt1_1.1.19-2_sparc.deb
Size/MD5 checksum: 129134 e6c3f1402576da329d515d9411f7fd53
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1.1_1.1.19-2_sparc.deb
Size/MD5 checksum: 217862 2ce2c27d8de0dc78ee4162b9664f7144
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dev_1.1.19-2_sparc.deb
Size/MD5 checksum: 598868 0acf342e57619d34685f76b879da8891
http://security.debian.org/pool/updates/main/libx/libxslt/libxslt1-dbg_1.1.19-2_sparc.deb
Size/MD5 checksum: 335962 947c59cd2f23b55b897ded3b31ccc1a6


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIPWiawM/Gs81MDZ0RAlFDAJ4r0ZndrATgh4xQO7tk0AidGIrk9ACeKtaR
0DnKvg1zG+OZlNoWRX3XyQw=
=HfoM
-----END PGP SIGNATURE-----
"


DSA 1577-1: New gforge packages fix insecure temporary files