Säkerhetsbulletin från Debian

DSA-1017-1 kernel-source-2.6.8 -- flera sårbarheter

Rapporterat den:
2006-03-23
Berörda paket:
kernel-source-2.6.8
Sårbara:
Ja
Referenser i säkerhetsdatabaser:
I Debians felrapporteringssystem: Fel 295949, Fel 334113, Fel 330287, Fel 332587, Fel 332596, Fel 330343, Fel 330353, Fel 327416.
I Mitres CVE-förteckning: CVE-2004-1017, CVE-2005-0124, CVE-2005-0449, CVE-2005-2457, CVE-2005-2490, CVE-2005-2555, CVE-2005-2709, CVE-2005-2800, CVE-2005-2973, CVE-2005-3044, CVE-2005-3053, CVE-2005-3055, CVE-2005-3180, CVE-2005-3181, CVE-2005-3257, CVE-2005-3356, CVE-2005-3358, CVE-2005-3783, CVE-2005-3784, CVE-2005-3806, CVE-2005-3847, CVE-2005-3848, CVE-2005-3857, CVE-2005-3858, CVE-2005-4605, CVE-2005-4618, CVE-2006-0095, CVE-2006-0096, CVE-2006-0482, CVE-2006-1066.
Ytterligare information:

Flera lokala och utifrån nåbara sårbarheter har upptäckts i Linuxkärnan, vilka kan utnyttjas till överbelastningsattacker eller exekvering av godtycklig kod. Projektet Common Vulnerabilities and Exposures identifierar följande problem:

  • CVE-2004-1017

    Flera buffertspill finns i io_edgeport-drivrutinen, vilka kanske kunde utnyttjas som vektor för en överbelastningsattack.

  • CVE-2005-0124

    Bryan Fulton rapporterade ett fel i begränsningskontrollerna i funktionen coda_pioctl vilket gjorde det möjligt för lokala användare att exekvera godtycklig kod eller utföra en överbelastningsattack.

  • CVE-2005-0449

    Ett fel i funktionen skb_checksum_help() från netfilter-ramverket har upptäckts, vilket gjorde det möjligt att förbigå paketfilterregler eller utnyttjas till en överbelastningsattack.

  • CVE-2005-2457

    Tim Yamin upptäckte att otillräcklig kontroll av indata i zisofs-drivrutinen för komprimerade ISO-filsystem gjorde det möjligt med en överbelastningsattack genom specialskrivna ISO-avbildningar.

  • CVE-2005-2490

    Ett buffertspill i funktionen sendmsg() gjorde det möjligt för lokala angripare att exekvera godtycklig kod.

  • CVE-2005-2555

    Herbert Xu upptäckte att funktionen getsockopt() inte begränsades till användare/processer med kapabiliteten CAP_NET_ADMIN. Detta gjorde det möjligt för angripare att manipulera IPSEC-policyn eller utföra en överbelastningsattack.

  • CVE-2005-2709

    Al Viro upptäckte en kapplöpningseffekt i /proc-hanteringen för nätverksenheter. En (lokal) angripare kunde utnyttja förlegade referenser efter att gränssnittet inaktiverats till en överbelastningsattack eller möjligen exekvera kod i kärnläge.

  • CVE-2005-2800

    Jan Blunck upptäckte att repeterade misslyckade läsningar av /proc/scsi/sg/devices läckte minne, vilket tillät överbelastningsattacker.

  • CVE-2005-2973

    Tetsuo Handa upptäckte att funktionen udp_v6_get_port() från IPv6-koden kunde tvingas in i en oändlig slinga, vilket tillät överbelastningsattacker.

  • CVE-2005-3044

    Vasiliy Averin upptäckte att referensräknare från sockfd_put() och fput() kunde tvingas överlappa, vilket tillät överbelastningsattacker genom att en null-pekare avrefererades.

  • CVE-2005-3053

    Eric Dumazet upptäckte att systemanropet set_mempolicy() tillät ett negativt värde som första parameter, vilket utlöste en BUG()-kontroll. Detta gjorde en överbelastningsattack möjlig.

  • CVE-2005-3055

    Harald Welte upptäckte att om en process utför en USB Request Block (URB) till en enhet och avslutar innan URB:n är färdig kan en förlegad pekare avrefereras. Detta kunde utnyttjas till att utlösa en överbelastningsattack.

  • CVE-2005-3180

    Pavel Roskin upptäckte att drivrutinen för trådlösa nätverkskort från Orinoco städar sina buffertar på ett otillräckligt sätt. Detta kunde läcka känslig information in i användarrymden.

  • CVE-2005-3181

    Robert Derr upptäckte att audit-undersystemet använde en ogiltig funktion för att frigöra minne, vilket tillät en överbelastningsattack.

  • CVE-2005-3257

    Rudolf Polzer upptäckte att kärnan felaktigt begränsade åtkomst till ioctl KDSKBSENT, vilket möjligen kunde leda till utökning av privilegier

  • CVE-2005-3356

    Doug Chapman upptäckte att systemanropet mq_open kunde luras till att räkna ned en intern räknare två gånger, vilket öppnade för en överbelastningsattack genom en kärnpanik.

  • CVE-2005-3358

    Doug Chapman upptäckte att en noll-bitmask i systemanropet set_mempolicy() leder till en kärnpanik, vilket gjorde en överbelastningsattack möjlig.

  • CVE-2005-3783

    Ptrace-koden som använde CLONE_THREAD använde inte trådens grupp-id för att bestämma om anroparen ansluter till sig själv, vilket kunde utnyttjas till en överbelastningsattack.

  • CVE-2005-3784

    Automatborttagandet av underprocesser inkluderade ptraced-anslutna processer, vilket möjliggjorde överbelastningsattacker genom kvarhängande referenser.

  • CVE-2005-3806

    Yen Zheng upptäckte att IPv6-flow label-koden modifierade en inkorrekt variabel, vilket kunde leda till minnesöverskrivningar och utnyttjas till överbelastningsattacker.

  • CVE-2005-3847

    Det har upptäckts att en trådad realtidsprocess samtidigt som den dumpar core kunde tvingas in i en låst situation genom att sända en SIGKILL-signal, vilket öppnade för en överbelastningsattack.

  • CVE-2005-3848

    Ollie Wild upptäckte en minnesläcka i funktionen icmp_push_reply(), vilken gjorde det möjligt för en överbelastningsattack genom att minne konsumerades.

  • CVE-2005-3857

    Chris Wright upptäckte att överdriven allokering av brutna fillåsuthyrningar i VFS-lagret kunde få minnet att ta slut och fylla upp systemloggen, vilket kunde utnyttjas till en överbelastningsattack.

  • CVE-2005-3858

    Patrick McHardy upptäckte en minnesläcka i funktionen ip6_input_finish() från IPv6-koden, vilket gjorde en överbelastningsattack möjlig.

  • CVE-2005-4605

    Karl Janmar upptäckte ett teckenfel i procfs-koden, vilket kunde utnyttjas till att läsa kärnans minne, vilket kunde avslöja känslig information.

  • CVE-2005-4618

    Yi Ying upptäckte att sysctl inte korrekt tvingar storleken på en buffert, vilket möjliggjorde en överbelastningsattack.

  • CVE-2006-0095

    Stefan Rompf upptäckte att dm_crypt inte rensade en intern struktur innan den frigjordes, vilket kunde avslöja känslig information.

  • CVE-2006-0096

    Det upptäcktes att SDLA-drivrutinens kapabilitetskontroller var för avslappnade för fastprogramuppdateringar.

  • CVE-2006-0482

    Ludovic Courtes upptäckte att get_compat_timespec() utförde otillräcklig städning av indata, vilket gjorde en lokal överbelastningsattack möjlig.

  • CVE-2006-1066

    Det upptäcktes att ptrace() på ia64-arkitekturen tillät lokala överbelastningsattacker då avbrytbarhet aktiverats.

Följande tabell beskriver vilka kärnversioner för vilka arkitekturer rättar problemen som nämns ovan:

Debian 3.1 (Sarge)
Källkod 2.6.8-16sarge2
Alpha-arkitekturen 2.6.8-16sarge2
AMD64-arkitekturen 2.6.8-16sarge2
HP Precision-arkitekturen 2.6.8-6sarge2
Intel IA-32-arkitekturen 2.6.8-16sarge2
Intel IA-64-arkitekturen 2.6.8-14sarge2
Motorola 680x0-arkitekturen2.6.8-4sarge2
PowerPC-arkitekturen 2.6.8-12sarge2
IBM S/390-arkitekturen 2.6.8-5sarge2
Sun Sparc-arkitekturen 2.6.8-15sarge2

Följande tabell visas tilläggspaket som byggts om för kompatibilitet med eller för att dra nyttja av denna uppdatering:

Debian 3.1 (Sarge)
kernel-latest-2.6-alpha 101sarge1
kernel-latest-2.6-amd64 103sarge1
kernel-latest-2.6-hppa 2.6.8-1sarge1
kernel-latest-2.6-sparc 101sarge1
kernel-latest-2.6-i386 101sarge1
kernel-latest-powerpc 102sarge1
fai-kernels 1.9.1sarge1
hostap-modules-i386 0.3.7-1sarge1
mol-modules-2.6.8 0.9.70+2.6.8+12sarge1
ndiswrapper-modules-i3861.1-2sarge1

Vi rekommenderar att ni uppgraderar ert kärnpaket omedelbart och startar om maskinen. Om du har byggt en egen kärna från kärnkällkodspaketet måste den byggas om för att dra nyttja av dessa rättelser.

Denna uppdatering introducerar en ändring i kärnans binära gränssnitt, de kärnpaket i Debian som påverkas har byggts om. Om du kör med lokala tillägg måste du även bygga om dessa. På grund av ändringar i paketnamnen måste du använda apt-get dist-upgrade för att uppdatera ditt system.

Rättat i:

Debian GNU/Linux 3.1 (sarge)

Källkod:
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb
http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb
http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge2_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge2_m68k.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge2_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc_0.9.70+2.6.8+12sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc-smp_0.9.70+2.6.8+12sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge2_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge2_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge2_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc32_101sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64_101sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc32_101sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64_101sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64-smp_101sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb
Arkitekturoberoende komponent:
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge2_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge2_all.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge2_all.deb

MD5-kontrollsummor för dessa filer finns i originalbulletinen.