Debian 10234 Published by

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1018-2 security@debian.org
http://www.debian.org/security/ Dann Frazier, Simon Horman
April 5th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : kernel-source-2.4.27
Vulnerability : several
Problem-Type : local/remote
Debian-specific: no
CVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618

The original update lacked recompiled ALSA modules against the new kernel
ABI. Furthermore, kernel-latest-2.4-sparc now correctly depends on the
updated packages.

For completeness we're providing the original problem description:

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2004-0887

Martin Schwidefsky discovered that the privileged instruction SACF (Set
Address Space Control Fast) on the S/390 platform is not handled properly,
allowing for a local user to gain root privileges.

CVE-2004-1058

A race condition allows for a local user to read the environment variables
of another process that is still spawning through /proc/.../cmdline.

CVE-2004-2607

A numeric casting discrepancy in sdla_xfer allows local users to read
portions of kernel memory via a large len argument which is received as an
int but cast to a short, preventing read loop from filling a buffer.

CVE-2005-0449

An error in the skb_checksum_help() function from the netfilter framework
has been discovered that allows the bypass of packet filter rules or
a denial of service attack.

CVE-2005-1761

A vulnerability in the ptrace subsystem of the IA-64 architecture can
allow local attackers to overwrite kernel memory and crash the kernel.

CVE-2005-2457

Tim Yamin discovered that insufficient input validation in the compressed
ISO file system (zisofs) allows a denial of service attack through
maliciously crafted ISO images.

CVE-2005-2555

Herbert Xu discovered that the setsockopt() function was not restricted to
users/processes with the CAP_NET_ADMIN capability. This allows attackers to
manipulate IPSEC policies or initiate a denial of service attack.

CVE-2005-2709

Al Viro discovered a race condition in the /proc handling of network devices.
A (local) attacker could exploit the stale reference after interface shutdown
to cause a denial of service or possibly execute code in kernel mode.

CVE-2005-2973

Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code
can be forced into an endless loop, which allows a denial of service attack.

CVE-2005-3257

Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.

CVE-2005-3783

The ptrace code using CLONE_THREAD didn't use the thread group ID to
determine whether the caller is attaching to itself, which allows a denial
of service attack.

CVE-2005-3806

Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,
which could lead to memory corruption and denial of service.

CVE-2005-3848

Ollie Wild discovered a memory leak in the icmp_push_reply() function, which
allows denial of service through memory consumption.

CVE-2005-3857

Chris Wright discovered that excessive allocation of broken file lock leases
in the VFS layer can exhaust memory and fill up the system logging, which allows
denial of service.

CVE-2005-3858

Patrick McHardy discovered a memory leak in the ip6_input_finish() function from
the IPv6 code, which allows denial of service.

CVE-2005-4618

Yi Ying discovered that sysctl does not properly enforce the size of a
buffer, which allows a denial of service attack.

The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

Debian 3.1 (sarge)
Source 2.4.27-10sarge2
Alpha architecture 2.4.27-10sarge2
ARM architecture 2.4.27-2sarge2
Intel IA-32 architecture 2.4.27-10sarge2
Intel IA-64 architecture 2.4.27-10sarge2
Motorola 680x0 architecture 2.4.27-3sarge2
Big endian MIPS architecture 2.4.27-10.sarge1.040815-2
Little endian MIPS architecture 2.4.27-10.sarge1.040815-2
PowerPC architecture 2.4.27-10sarge2
IBM S/390 architecture 2.4.27-2sarge2
Sun Sparc architecture 2.4.27-9sarge2

The following matrix lists additional packages that were rebuilt for
compatability with or to take advantage of this update:

Debian 3.1 (sarge)
kernel-latest-2.4-alpha 101sarge1
kernel-latest-2.4-i386 101sarge1
kernel-latest-2.4-s390 2.4.27-1sarge1
kernel-latest-2.4-sparc 42sarge2
kernel-latest-powerpc 102sarge1
fai-kernels 1.9.1sarge1
i2c 1:2.9.1-1sarge1
kernel-image-speakup-i386 2.4.27-1.1sasrge1
lm-sensors 1:2.9.1-1sarge3
mindi-kernel 2.4.27-2sarge1
pcmcia-modules-2.4.27-i386 3.2.5+2sarge1
systemimager 3.2.3-6sarge1
alsa-modules-i386 1.0.8+2sarge1

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.

This update introduces a change in the kernel's binary interface, the affected
kernel packages inside Debian have been rebuilt, if you're running local addons
you'll need to rebuild these as well.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get dist-upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.diff.gz
Size/MD5 checksum: 713256 04938bd9582171f13459f40245fdb402
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.dsc
Size/MD5 checksum: 685 8d2419804b5d12e4602271c26dcad450
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.dsc
Size/MD5 checksum: 1089 13968c7c9bb075bad3b2cb95feef384c
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.dsc
Size/MD5 checksum: 1129 4396133a6b96b9dbceb66d2a48852d88
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.diff.gz
Size/MD5 checksum: 32931 119d0d836ed566e15624f809701d0ab9
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.dsc
Size/MD5 checksum: 1345 1a4ebdb73d7bd94d2b0d51b75f5451cc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.tar.gz
Size/MD5 checksum: 30119 0df45f3ce9d32988eed0d9567cf0b4fa
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.tar.gz
Size/MD5 checksum: 53307 d8a5d2061c0790cfd9467864502818e3
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz
Size/MD5 checksum: 101556 397541e2aa7fc958a4852dffa6c8d1fb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.dsc
Size/MD5 checksum: 1074 ba4f46144c5db2a3c76358689fdb0185
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.tar.gz
Size/MD5 checksum: 32208 71392893f2e012ffafaab2bb43f8e488
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.dsc
Size/MD5 checksum: 831 687b8a0516c44a1527a90f5df5c772ab
http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.tar.gz
Size/MD5 checksum: 15975115 9fd8b15f9f92314ea9cea3f22a77ec5b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.dsc
Size/MD5 checksum: 839 878a7971258f25a1c17fdb6362e9909f
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.dsc
Size/MD5 checksum: 900 efe323453f0dc718c6d9490ca3ca691e
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.tar.gz
Size/MD5 checksum: 2617 cf7e82afaef00b0cf93521fdccf4ed5c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.tar.gz
Size/MD5 checksum: 9841 53b6e1fe5e9060c93ef9ff91cedf490f
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.dsc
Size/MD5 checksum: 1143 9cc5658049d0158385bc82424ab75361
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz
Size/MD5 checksum: 1597 fcbb9bc6a69ad10f0712ea03cad557ef
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.tar.gz
Size/MD5 checksum: 1950 c4a4fbe2095a7d43cf6b33cc9c73f372
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.diff.gz
Size/MD5 checksum: 2786 a0a40636362e7f5c03ffae5fca94edbd
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.tar.gz
Size/MD5 checksum: 1462678 eab044878df015bbf85329c2498ed8e8
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.tar.gz
Size/MD5 checksum: 20216 0ae4467cf28f4a513e68c2d6ba413d9b
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.tar.gz
Size/MD5 checksum: 97376 1a3af863ee67797a398cc33c1b3fcf3c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.dsc
Size/MD5 checksum: 1581 53d1f65a236f842d634d2f472d761792
http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.dsc
Size/MD5 checksum: 857 6c617b10e65d623d40a8c5d6d89107f9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.tar.gz
Size/MD5 checksum: 8212 0598b1ff05e1d4dd4c434a39c9f018a6
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.dsc
Size/MD5 checksum: 750 4d8bed84c0e377a458977c40ef253a64
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz
Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709
http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.dsc
Size/MD5 checksum: 1012 0fcee4cf17e43873f37e6920aa11dd1c
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.dsc
Size/MD5 checksum: 732 99407eb60a651fe0d937fc9ce0942885
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.dsc
Size/MD5 checksum: 875 9af3fd80b96a54759a11563dc735f349
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.dsc
Size/MD5 checksum: 831 fb35a83abc577050eefca213f1c1e5ef
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc
Size/MD5 checksum: 825 5ddcf45bf8e95a7f1004e6ad97d9502e
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.tar.gz
Size/MD5 checksum: 307908 19a86536a0b624c16cb95e6277510eeb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc
Size/MD5 checksum: 663 32e3700237d6c8399991db0cb219ca2b
http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz
Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.tar.gz
Size/MD5 checksum: 16651 4681c5a0ef28cf92bc861a477859f424
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.dsc
Size/MD5 checksum: 1051 1063b480da66a98327389106a60fd1de
http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.diff.gz
Size/MD5 checksum: 9623 3900d3b14fc77579eb661dac9d7becdb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.dsc
Size/MD5 checksum: 848 54a0059bc7215f82dd95c64e729b0dd4
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.tar.gz
Size/MD5 checksum: 2243 7dd011636f037d3e004e202cdcef99dd

Architecture independent components:

http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge2_all.deb
Size/MD5 checksum: 671384 656244ac0eeb0edfd0eec5cf80526303
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge3_all.deb
Size/MD5 checksum: 945646 e1bc68ea39ee276dfb3a24318c8aa765
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge1_all.deb
Size/MD5 checksum: 2418378 cebb78cbbb3762c243f99b86884cc5ac
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 9542922 f8049a1e8cee07d0e2a1fdc7357e252a
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 4758102 b469e5a3b6bc93a459274310199899a7
http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge1_all.deb
Size/MD5 checksum: 159912 1c1283ab19292c86be4fa765840eff13
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge2_all.deb
Size/MD5 checksum: 3578772 5b413310b3826dec3f0113e1215ca51f
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge2_all.deb
Size/MD5 checksum: 25710 12d938fd6fe17432924452f0f8ae039f
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 29630 81379a2aae787fcb85eb937cffb8e62e
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 630106 3557f0934650e872d93b88b5150f9815
http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb
Size/MD5 checksum: 106132 81b855594bb23ab228c447f2f5343c8e
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 115340 5e1b98b83d853a2a0c24695ff1c82251
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2_all.deb
Size/MD5 checksum: 31030888 b556d3b35835290ef34e01c23b0dfb7b
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 29366 b65b98e266e64ff2a5cdd74558a0a922
http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge1_all.deb
Size/MD5 checksum: 14680 d45c6cd85a3bb2d3388d9bbe6cc422e5
http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb
Size/MD5 checksum: 304520 cad3f6be07e47fc9163882225608a2c5

Alpha architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge2_alpha.deb
Size/MD5 checksum: 4572390 9d8b171c601c6aa551bcb9a2be6862f1
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb
Size/MD5 checksum: 1986 bda45dedcf2b5ed4f6b8d030f18e11b6
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb
Size/MD5 checksum: 1982 7ee85d7e5e2753a2b379de867c127c78
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb
Size/MD5 checksum: 16518544 b49f831395ee62bde73f0aad25ddd438
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb
Size/MD5 checksum: 16968168 db461b6d5cfb842ead1420c0edb61f99
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb
Size/MD5 checksum: 270900 5e321af02b9c205f38bbc4be49fbc9a8
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb
Size/MD5 checksum: 1980 475f0b3c517d16740be06abbc4e3d4a9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge2_alpha.deb
Size/MD5 checksum: 5732 43ca0eeaab913f6faef8eb5a2f432741
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb
Size/MD5 checksum: 272828 9c7e1914da800e5e98fd6336c9ad6060
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb
Size/MD5 checksum: 1980 6da3aab7853283f763332efde9619e7c

ARM architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 4657792 6efae5dc812abfc779c02c402df0fd3d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 3142828 79bb6bed414464dfb134ca5be8eb0d9a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 3665410 a91d34d5ddf87dfb43d2fa1252679d70
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 7330418 38c4e7edaf85174e42c1a0272cd71090
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 1054774 e098137f0ef0d731443810ee9eaed718
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 463856 eaa7abc8f41e6e10ca123b8c27f348a9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge2_arm.deb
Size/MD5 checksum: 1689532 d636ec6606fd50d41fc4f6f5e5d5e103

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb
Size/MD5 checksum: 11302740 d57ff9246788c39d98903f7b3270fabd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 1823622 2acb45e3fed2a4d7f2e952a258864081
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 12338568 be29794a003a05edc00e3a03d34b3eea
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb
Size/MD5 checksum: 2286 4b863896be1e22d0c1005131b8f9bfec
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 258984 f0ca8379fd4fe3e7bd07480630d01b05
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge1_i386.deb
Size/MD5 checksum: 2158 b17c62827446c35c0e8f787a262aa180
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 298250 836b9106a35174e7232c018cd2d2c71a
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 477580 24ef30a122508783dc22e87a43923e45
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 11049922 6548a659a11435f1b6ebcefd850c7b69
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 299950 27e5ee810fc890b649ad25cc2edff073
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb
Size/MD5 checksum: 2168 1b80507c432362c471b60ee18b47d0b4
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 258980 cf019b62e65a17b0ed20e149faa44559
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 267748 9555f73de465bd2114d0caf2a41acff2
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 259572 9505af261ada93ee26c66a3fb0d7d82e
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb
Size/MD5 checksum: 2164 ac150587b9d3f22de309ea312f11c321
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 484192 c46d1f7e98b6b3e625158ddaca907951
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 477610 61f0e8d1bd3dcbf8447a15f3986710ce
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 477644 302afa94885da8c4f143b8f5aa3476b0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 292198 ff62442bd8a017f09636faa7087eaf08
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge1_i386.deb
Size/MD5 checksum: 2176 8f3ad5ed0dc40fc3d9427412798905ca
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 298386 aae34ecc6770f907d0b7de0e7203fac6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 297322 bd2931acac7b7e82b240031b76dbb2a0
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge1_i386.deb
Size/MD5 checksum: 2214 b0da0d519fee471f1445bcec8e1072c3
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 12025684 071b3edb763ba490c0101452d467c8a1
http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1_i386.deb
Size/MD5 checksum: 7765638 f8e51efba0f3cb10b658e01e12c6b9bb
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77860 2412ecaf415f28cedf1594fc5853a59d
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 258984 1e42dac94e18a442204e159252730d5e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 297106 adfdcbda85639abcd9d387baa6779ef1
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb
Size/MD5 checksum: 2250 c1d2ec30560223773db6fb3fb5f68260
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 292582 4cc3a32beb6a18a7b8c97f0e174f7eb6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 12417806 4fbf262234903a4eac5f36b2a8a0b11e
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge1_i386.deb
Size/MD5 checksum: 2158 a83bda3df1131288d169b1c44d2f6f95
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 477608 0dfded776cb25f87885f3e2cd54139fb
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77586 7a73742b7405143708835f3932f9fa70
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb
Size/MD5 checksum: 2198 53f3a8546c48f4872424f905cf7885b0
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb
Size/MD5 checksum: 2248 130656ebcf35178df320c2f80ff446b3
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 298294 040778c609195abb76faf5dc6b2c4484
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb
Size/MD5 checksum: 2180 ed27ff9b477d3f06a89636ff63c1a608
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 286360 256a7cfba28e8f80e5ed1b36d463bbaa
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb
Size/MD5 checksum: 2198 73159b5fcca4e503e4e39d26d01f611b
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge1_i386.deb
Size/MD5 checksum: 2152 bf549dc4754ad6432ec6a9133c288b55
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge1_i386.deb
Size/MD5 checksum: 2182 32ef20edb04d84ae67b59ef74ca73c41
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb
Size/MD5 checksum: 2250 8fe3e928f92a4148cf5aef691717defd
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb
Size/MD5 checksum: 2226 11a3d9e97540823f189274cbf0964f40
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb
Size/MD5 checksum: 2268 eb19757eb174ca892c60b9ca003f6993
http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 93990 ddf78ba3ee58f63c3ebb6ab2b686cbc9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 11709566 cc9d039b9cec5d5532023bffd1e13203
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77734 5e4b8007c196b17ee41776406b0b8230
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb
Size/MD5 checksum: 2178 a47be61afd7e8d4b63eaa0d5facec45c
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb
Size/MD5 checksum: 2176 cd6cfe3b2f4d398d759906817afafdf9
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77604 c427abcb6f60c5bf1ac10bc19a65a8b8
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 12680486 1cb5b20b959b842df55c59a72278c084
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 258980 ed75fb59949e2364abfc9459a4832fb3
http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 56466 54f5cb20cca23c63adb22dacd6710641
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 477594 429eb2dd9bec9b005332f8025849f378
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 303960 7163cde6ff6fb60f77c3be86b98c9ed9
http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb
Size/MD5 checksum: 4770342 c029fb318f3e99e16df3cc4431f48b06
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 300096 d72f151d92cd2b9e3b32247987bc9d77
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 259296 a1674fac85b1dc7aaf4e43099bf6de5c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 297542 e374488c0c43422a644ee1d8d5687f89
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 474438 5bad3d0b235b6dd4e13d1cd124dc0b8f
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge1_i386.deb
Size/MD5 checksum: 2200 3641ec5e13ebe5cbf5713d7b6a9af77a
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77592 9655842dd75143b38d9591c05c069ac7
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77674 f068190e67295066533fb3fff111c814
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 8342 a1fe9c769945a7635ecc03b1e187e7fc
http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 259850 b623d22abc6f054d77b7a30917f08009
http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb
Size/MD5 checksum: 77678 0a7beec37cd1bf7ec8f1731ae9d6bb9a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 12086466 5af66657e22fdb6314119ea36a6c1c75
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge1_i386.deb
Size/MD5 checksum: 2188 d2c285ee0c9bc108e0d4cd2e678bc6e0
http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb
Size/MD5 checksum: 484198 53b2e26c3a6892fe41301e31a8e91701
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge2_i386.deb
Size/MD5 checksum: 298018 9d13a45679af6957abfc23b8878073c4
http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge3_i386.deb
Size/MD5 checksum: 77968 bd243ceab2becfd668549358465abe69

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 16976446 51987cad8f3f6eb3281ce356f736f90d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 17021738 57ead1bebe1a5f0eccc071e6a5f30f54
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 4986 e10834d87d38a13a5c2ee5f13eed4d02
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 240590 4f512fc8f28e2a11cdd97569319d90f5
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 240498 d4a0592c1014cd8d2d3b87ae052ff995
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 4956 bd7812c913d7ea5ce87e8a249b8935af
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 5226 d74eb98006da5dab26589509ded5f29e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 239378 83101f13dbb75a77ff1a2685c1b59bfd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 4992 7ba2aacc74bc4ac4370d2b6bf221e35a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 4687006 1230148f08b0c17763e79b94986bc9bd
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 4972 bfd5bcd58354b443c53a13bb6708be37
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 16621676 1bd285f8adedf710b1461724b0af8a61
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 239426 87381161e1e8d269ab82e51518cf79c4
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb
Size/MD5 checksum: 16667452 ca44e47123ea32e0efe93bca7794de8c

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2320966 4a15213792fd9ef48330cd67f767ab9d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2636422 ce2e589e3f58a53dcbbe362aa06bbdc0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2394430 d0d19d564536a6640fe1401b91830a05
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2393560 c8afb24f7148596650c8140bdad7aa0a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2260368 28858d5d8037969dddeed9eb787edae5
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2543228 6b5c2fdb57f7618bd884a56775fddea0
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge2_m68k.deb
Size/MD5 checksum: 2475286 a6f7278b437e2c9f1efaf8230a7cf038

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge2.040815-1_mips.deb
Size/MD5 checksum: 3848722 3cab75f38b72bff67ea0dae8239d2d8b
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge2.040815-1_mips.deb
Size/MD5 checksum: 3847778 f250503d744408577b15430e62b73f28
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mips.deb
Size/MD5 checksum: 7173140 99adeeb4f9a7ee12dbdd658311d4f641
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mips.deb
Size/MD5 checksum: 4680422 75df59733690bc09bd5c854ab7cabfbd
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mips.deb
Size/MD5 checksum: 18136 4ec345ef0b666b186646c2c209a9fda8

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 2136150 2f180ceeeff353b1ac0e7a2a2869badc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 4101818 b185a2cb8c1345d07c4f58f079c8abc8
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 4668528 ce59d155e7f5de0b9512c8ae07e7d19f
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 2990238 2305898af4fbe07fb3b86a3658926b2a
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 18174 c5f6f20831a72ba867d251700636c30d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 3031148 0b84aa08bbd98a75b3c6e615dc78acd5
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 7037466 690116f5951c221bfbbe94838a1afe0d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mipsel.deb
Size/MD5 checksum: 4685148 27568e054ecb5cfe22665cf3e4220d25

PowerPC architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 8722 fcfa53d79c741eb526efd83af6b77501
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 4800060 9c3bc9afe4bde5642d352199bd6910bc
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 1815364 531c6100c8a5ae8cd54a92c47935cacc
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 12749452 d1460d74881e9dee0abe8f1e66edc940
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 8796 b29ec0ebb05f2980425452ff60efc78d
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 65486 0aa2289da231fdcca1311650e9a7ecd4
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 2496580 506d7979b6b2ec7fe1485f7bff41a7be
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 153562 7d17ab040429b0802cbeb4a45ff4ed6a
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 13478332 65955c570b7d715dae51503d24248214
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 139374 14c07ada6bc05f9fdf9330d295ced263
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 153260 16794e5cc21f355da1df4153744d2cdc
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 4692188 97f4f54124d47127aaad6b30b68fda7b
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 13785186 9892ac04d3c9390c6a711a32af828152
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 4682152 1f4e90348fe6a188a2360f57493c0516
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 153314 ae274ab60fad595683c4decfecdd12de
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb
Size/MD5 checksum: 139174 7664ec4c4b8e49aad2271d8f9b91fa59

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb
Size/MD5 checksum: 1894 7c7d6ffff4091efa73369deb17b8c3a7
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge2_s390.deb
Size/MD5 checksum: 2775998 6574681ce171f9a74f7565ea3f3ce3f1
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb
Size/MD5 checksum: 1882 b2315be9f4c33a570f0da301890dd95d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge2_s390.deb
Size/MD5 checksum: 2967840 2ad64001085223fdd5f330bbbeb74e81
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge2_s390.deb
Size/MD5 checksum: 4577766 84aa474690a106c530558c478aff3a93
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb
Size/MD5 checksum: 1900 1db72f0edc5d91d2e33521c672348378
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge2_s390.deb
Size/MD5 checksum: 992372 6c160c930e44a2e995d6db92ded45ce4

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge2_sparc.deb
Size/MD5 checksum: 2208 615b8dfc3a03f9e888299159ec75c56d
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge2_sparc.deb
Size/MD5 checksum: 2216 622f8ddd76acaf9328e54aeb86c85def
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge2_sparc.deb
Size/MD5 checksum: 2208 d186163b6921a0d8dee98401b2dc2396
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge2_sparc.deb
Size/MD5 checksum: 2218 b9963b97417cc1e4f8c5ab0ce51e5bf2
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge2_sparc.deb
Size/MD5 checksum: 2184 a7d486f2c4a3c08a1aeb3b31351591d7
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge2_sparc.deb
Size/MD5 checksum: 2198 7c0fec52b6b0ae094e68846451ce79ea
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge2_sparc.deb
Size/MD5 checksum: 2188 475e7a109600079559506774c5a822eb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge2_sparc.deb
Size/MD5 checksum: 2200 3d1f9342a18271db94000bfeeebbd63a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 3785134 7ed118f20b7aa0065d8dc51c5f7015fc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 3598262 8077cc063a9638f64caa0b7501be6698
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 202410 925e828aac054961b71f4cb853a1a81d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 162680 8daeded3c5c21dadbc16fcb57e17ba0c
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 201200 b8d59c4959f3641efe0825be35475b60
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 8358 6721b433e723689deff7a75c1a152436
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 6377516 987de05fb71c80488eac9f9fa0be3dab
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 6544548 60fe57c18de3491548b4d2bf1bf2ca9e
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 164444 a4bbab66bcb9f637efb72ec48f4756c2
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge2_sparc.deb
Size/MD5 checksum: 2023602 04be2535bd4ea027a3167ae6aec300c2

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEM3UGXm3vHE4uyloRAs/HAJ0VVf8YyuaX0cO2Ho4UbAlTGsqDlQCghQNX
pFzLAoVDMS2B8sPYedFiwfI=
=eiPu
-----END PGP SIGNATURE-----