Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme im Kernel
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme im Kernel
ID: SUSE-SA:2006:042
Distribution: SUSE
Plattformen: SUSE Linux 9.1, SUSE Linux 9.2, SUSE Linux 9.3, SUSE Linux 10.0, SUSE LINUX 10.1
Datum: Mi, 26. Juli 2006, 16:35
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1859
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626
Applikationen: Linux

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

SUSE Security Announcement

Package: kernel
Announcement ID: SUSE-SA:2006:042
Date: Wed, 26 Jul 2006 14:00:00 +0000
Affected Products: SUSE LINUX 10.1
SUSE LINUX 10.0
SUSE LINUX 9.3
SUSE LINUX 9.2
SUSE LINUX 9.1
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2006-0744, CVE-2006-1528, CVE-2006-1855
CVE-2006-1857, CVE-2006-1858, CVE-2006-1859
CVE-2006-1860, CVE-2006-2444, CVE-2006-2445
CVE-2006-2448, CVE-2006-2450, CVE-2006-2451
CVE-2006-2934, CVE-2006-2935, CVE-2006-3085
CVE-2006-3626

Content of This Advisory:
1) Security Vulnerability Resolved:
Various kernel security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

The Linux kernel has been updated to fix several security issues.

This advisory refers to kernel updates for SUSE Linux 9.1 - 10.1.

For the SUSE Linux Enterprise 9 and 10, Novell Linux Desktop 9, Open
Enterprise Server products the kernel update is still in testing and
will be released within the next week.

SUSE Linux Enterprise 8 and SUSE Linux Desktop 1 with Linux 2.4 based
kernels are not affected by exploitable problems in their default
configuration and will not be updated with this security update round.

The SUSE Linux 10.1 kernel has been updated to state of the SUSE
Linux Enterprise 10 kernel and will continue to track it.
The updated kernel enables convenient use of kernel module packages
for NVIDIA and ATI drivers on SUSE Linux 10.1.
Please see the HOWTOs on http://opensuse.org/ on how to add and use
them. The update also includes a set of AppArmor and Kernel Module
Package (KMP) updates.

Following security issues fixed:
- CVE-2006-0744: When the user could have changed %RIP always force IRET,
now also fixed for the UML kernel.

- CVE-2006-1859: A memory leak in __setlease in fs/locks.c allows
local attackers to cause a denial of service (memory
consumption) via unspecified actions related to an
"uninitialized return value," aka "slab
leak."

- CVE-2006-1860: lease_init in fs/locks.c allows local attackers to cause a
denial of service (fcntl_setlease lockup) via actions
that cause lease_init to free a lock that might not
have been allocated on the stack.

- CVE-2006-1528: Linux allows local users to cause a denial of service
(crash)
via a Direct I/O transfer from the sg driver to memory
mapped (mmap) IO space.

- CVE-2006-1855: It was possible to potentially crash the kernel by
using CPU timers and timing the termination of the
parent process.

- CVE-2006-1857: A buffer overflow in the SCTP protocol could allow remote
attackers to cause a crash or possibly execute arbitrary
code via a malformed HB-ACK chunk.

- CVE-2006-1858: SCTP allowed remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a chunk
length that is inconsistent with the actual length of
provided parameters.

- CVE-2006-2444: The snmp_trap_decode function in the SNMP NAT helper
allows remote attackers to cause a denial of service
(crash) via unspecified remote attack vectors that cause
failures in snmp_trap_decode that trigger (1) frees of
random memory or (2) frees of previously-freed memory
(double-free) by snmp_trap_decode as well as its calling
function, as demonstrated via certain test cases of
the PROTOS SNMP test suite.

- CVE-2006-2445: A race condition in run_posix_cpu_timers allows local
users to cause a denial of service (BUG_ON crash)
by causing one CPU to attach a timer to a process that
is exiting.

- CVE-2006-2448: Due to missing checking of validity of user space pointers
it was possible for local attackers to read any kernel
memory, potentially exposing sensitive data to the
attacker or crash the kernel.
This problem is PowerPC specific.

- CVE-2006-3085: Fixed a remotely trigger able endless loop in SCTP
netfilter
handling caused by 0 chunk length.

- CVE-2006-2451: Due to an argument validation error in
prctl(PR_SET_DUMPABLE)
a local attacker can easily gain administrator (root)
privileges.

- CVE-2006-2934: When a SCTP packet without any chunks is received, the
newconntrack variable in sctp_packet contains an out of
bounds value that is used to look up an pointer from the
array of timeouts, which is then dereferenced, resulting
in a crash. Make sure at least a single chunk is present.

- CVE-2006-2935: A stack based buffer overflow in CDROM / DVD handling was
fixed which could be used by a physical local attacker
to crash the kernel or execute code within kernel
context, depending on presence of automatic DVD handling
in the system.

- CVE-2006-3626: A race condition allows local users to gain root
privileges by changing the file mode of /proc/self/
files in a way that causes those files (for instance
/proc/self/environ) to become setuid root.

The SUSE Linux 9.1 kernel update is the final SUSE Linux 9.1 YOU
update (see separate announcement from some days ago).

2) Solution or Work-Around

There is no known workaround, please install the update packages.

3) Special Instructions and Notes


SPECIAL INSTALLATION INSTRUCTIONS
=================================
The following paragraphs guide you through the installation
process in a step-by-step fashion. The character sequence "****"
marks the beginning of a new paragraph. In some cases, the steps
outlined in a particular paragraph may or may not be applicable
to your situation. Therefore, make sure that you read through
all of the steps below before attempting any of these
procedures. All of the commands that need to be executed must be
run as the superuser 'root'. Each step relies on the steps
before it to complete successfully.


**** Step 1: Determine the needed kernel type.

Use the following command to determine which kind of kernel is
installed on your system:

rpm -qf --qf '%{name}\n' /boot/vmlinuz


**** Step 2: Download the packages for your system.

Download the kernel RPM package for your distribution with the
name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
modules that are not free were moved to a separate package with
the suffix '-nongpl' in its name. Download that package as well
if you rely on hardware that requires non-free drivers, such as
some ISDN adapters. The list of all kernel RPM packages is
appended below.

The kernel-source package does not contain a binary kernel in
bootable form. Instead, it contains the sources that correspond
with the binary kernel RPM packages. This package is required to
build third party add-on modules.


**** Step 3: Verify authenticity of the packages.

Verify the authenticity of the kernel RPM package using the
methods as listed in Section 6 of this SUSE Security
Announcement.


**** Step 4: Installing your kernel rpm package.

Install the rpm package that you have downloaded in Step 2 with
the command

rpm -Uhv <FILE>

replacing <FILE> with the filename of the RPM package
downloaded.

Warning: After performing this step, your system may not boot
unless the following steps have been followed
completely.


**** Step 5: Configuring and creating the initrd.

The initrd is a RAM disk that is loaded into the memory of your
system together with the kernel boot image by the boot loader.
The kernel uses the content of this RAM disk to execute commands
that must be run before the kernel can mount its root file
system. The initrd is typically used to load hard disk
controller drivers and file system modules. The variable
INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
modules are loaded in the initrd.

After a new kernel rpm has been installed, the initrd must be
recreated to include the updated kernel modules. Usually this
happens automatically when installing the kernel rpm. If
creating the initrd fails for some reason, manually run the
command

/sbin/mkinitrd


**** Step 6: Update the boot loader, if necessary.

Depending on your software configuration, you either have the
LILO or GRUB boot loader installed and initialized on your
system. Use the command

grep LOADER_TYPE /etc/sysconfig/bootloader

to find out which boot loader is configured.

The GRUB boot loader does not require any further action after a
new kernel has been installed. You may proceed to the next step
if you are using GRUB.

If you use the LILO boot loader, lilo must be run to
reinitialize the boot sector of the hard disk. Usually this
happens automatically when installing the kernel RPM. In case
this step fails, run the command

/sbin/lilo


Warning: An improperly installed boot loader will render your
system unbootable.


**** Step 7: Reboot.

If all of the steps above have been successfully completed on
your system, the new kernel including the kernel modules and the
initrd are ready to boot. The system needs to be rebooted for
the changes to be active. Make sure that all steps have been
completed then reboot using the command

/sbin/shutdown -r now

Your system will now shut down and restart with the new kernel.

4) Package Location and Checksums

The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command

rpm -Fhv <file.rpm>

to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.


x86 Platform:

SUSE LINUX 10.1:
apparmor-parser-2.0-21.5.i586.rpm
9cd9a522ee1844e945b580697cf23ad9
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/audit-1.1.3-23.3.i586.rpm
89d2201c3dbc746ec24cf4bd4cb44559
audit-devel-1.1.3-23.3.i586.rpm
72540e4f65fd2edf1782a75114fccb9f
audit-libs-1.1.3-23.3.i586.rpm
4cf153c5f2f544d0766a00fa83b3c8ef
cloop-kmp-bigsmp-2.01_2.6.16.21_0.13-22.3.i586.rpm
6bdf25dbf6a23a529fcb03a64b17cebf
cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.i586.rpm
a844ad701dd378b34a4cadc0e4c22e6f
cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.i586.rpm
dff4d32521e85e17d4f8ff6adca93949
cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.i586.rpm
cef9a15763ee6932c53ee21473cd4997
cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.i586.rpm
ba16f758468d56f1d7923db3b0904631
cloop-kmp-xenpae-2.01_2.6.16.21_0.13-22.3.i586.rpm
2c43fb6f07d4bfe9b93870e5427c1895
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/drbd-0.7.18-3.3.i586.rpm
e7b20cfae135aa61d35b7a5b21c74330
drbd-kmp-bigsmp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
909215493b300108c63119ab9f096d79
drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
e113b1b042ae80eab80c23c4c28cf97f
drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
b69e5fc59ca5d0c240fd53fc98a5484a
drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
6c9bac44ad763009d4331401d3ac10ec
drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
3188da9046488df7bed609ffd7ce54fe
drbd-kmp-xenpae-0.7.18_2.6.16.21_0.13-3.3.i586.rpm
bb3ef37bcb236e56be33e14e1e367983
hbedv-dazuko-kmp-bigsmp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
b9ecda8924b39c2ef58543daeb27f35f
hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
410388ef1c72ff622aa163a5c2d9df4c
hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
afb6655fed055160232e9e88da940b24
hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
23bab134a07330c207e7318843c82a79
hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
4797651065a56662beb54b0a6bc88b12
hbedv-dazuko-kmp-xenpae-2.1.1_2.6.16.21_0.13-3.1.i586.rpm
77832a824919e683087693f24db509f6
ivtv-kmp-bigsmp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
57aefc602afcb1d96e386a748c84077f
ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
641354f8153682d9657809ff3de2ceef
ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
32c3dd5b3aa99ba22851a5b8437c3198
ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
261b6e2cef8380c105f1175813b6652e
ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
2b0a21a904508d395e3fb6ae250bb97d
ivtv-kmp-xenpae-0.7.0_2.6.16.21_0.13-12.1.i586.rpm
bdb122fa51617514703c0e6655976ecb
kernel-bigsmp-2.6.16.21-0.13.i586.rpm
a7cd535abc7d7369df33218549a40641
kernel-debug-2.6.16.21-0.13.i586.rpm
76afdaa38402761b7a4547d346128d12
kernel-default-2.6.16.21-0.13.i586.rpm
c02ef80cf6259e9c2e2367d906ddbce5
kernel-kdump-2.6.16.21-0.13.i586.rpm
7d2ae84459eb40f27eb27ccd17f40065
kernel-smp-2.6.16.21-0.13.i586.rpm
bb548b149f045f71f0cc77cdeab3554e
kernel-source-2.6.16.21-0.13.i586.rpm
06f6819e6b542f818dfc1cf8b177d21c
kernel-syms-2.6.16.21-0.13.i586.rpm
c03b63fe79c14b963c2ca952d741507b
kernel-um-2.6.16.21-0.13.i586.rpm
47dfc55b417521fc8f89719a26590b8b
kernel-xen-2.6.16.21-0.13.i586.rpm
ce2c2a0c3d8f8de549f7f9e464b215c6
kernel-xenpae-2.6.16.21-0.13.i586.rpm
0ebf3e42683ade314e2eb216ee11de72
kexec-tools-1.101-32.17.i586.rpm
28f60804adcf7e5d19ec52b4d64de043
lirc-kmp-bigsmp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
67b4f753cc31f80de61e6c3b46511ad8
lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
fe279b89071ac503553a3ef9f7006ccb
lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
b051b17aaa7f5f3faddd7ae04e17b25b
lirc-kmp-xenpae-0.8.0_2.6.16.21_0.13-5.1.i586.rpm
91e65fa9b282efc42f012b27f55db16c
mkinitrd-1.2-106.15.i586.rpm
3f795b29fdf6a9bc66eb42c8686c7977
multipath-tools-0.4.6-25.9.i586.rpm
d8dafe24a0f64529fa92a7f21acd88dd
ndiswrapper-kmp-bigsmp-1.10_2.6.16.21_0.13-19.3.i586.rpm
e5a0788af9f6f93be7592212fa4e1d4f
ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.i586.rpm
188cdc73cf94c84cef6d9bfec587da9d
ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.i586.rpm
9b8abac21a6ed044bdde306d27f97b03
ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.i586.rpm
2865814e726de3c07e4a63433e2408ae
ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.i586.rpm
d49abd0a6bd8319a6bf35665cb20e1f1
ndiswrapper-kmp-xenpae-1.10_2.6.16.21_0.13-19.3.i586.rpm
38bbad45bd3915010d26dd7dbf07b570
novfs-kmp-bigsmp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
a20595f9f88f23363aea1e281a853bb9
novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
e266f1647fd1d9b3fe53782249aa8017
novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
21c7664b863b822b7e6fca494167dca7
novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
206c4c2c37edbe12a532d7df17992fe5
novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
74f8ee6ce6fb0ba4264027d82dedfed2
novfs-kmp-xenpae-1.2.0_2.6.16.21_0.13-9.2.i586.rpm
684fe3618c802c5949c16c2e23490fa7
omnibook-kmp-bigsmp-20060126_2.6.16.21_0.13-3.1.i586.rpm
aa274c0190792577dae5400fecad7642
omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.i586.rpm
b37e5f6d1afff4d17236e781e908c4a2
omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.i586.rpm
504aee4caf372688dd59254b4296a071
omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.i586.rpm
826ef0e62b77ee7db3515c4f81d918fb
omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.i586.rpm
ba37438f88bb172e407d6e4db00fab9a
omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.i586.rpm
3976e689381649ba359466ba5f891322
omnibook-kmp-xenpae-20060126_2.6.16.21_0.13-3.1.i586.rpm
cb6ef7570da4621c6db5c23bbe9e382e
open-iscsi-0.5.545-9.13.i586.rpm
99aa6db3390acb91b9c67ac251c2ffc3
openafs-kmp-xenpae-1.4.0_2.6.16.21_0.13-21.1.i586.rpm
a56246ac270979f33de6dff3aa6b9d43
pcfclock-kmp-bigsmp-0.44_2.6.16.21_0.13-15.1.i586.rpm
afa731bcb72c96c2e3554518143a2941
pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.i586.rpm
8479ea66ef737620144bfa24d5793005
pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.i586.rpm
702881557801a075ae91c8662556181d
pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.i586.rpm
fc4dfe6ba9c75dacbd9f4cf5f3b4dfbd
quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.i586.rpm
82ace92edf245eceddd502b65632b4af
tpctl-kmp-bigsmp-4.17_2.6.16.21_0.13-30.3.i586.rpm
26815c7856a9b3e2912bba2e10baac34
tpctl-kmp-debug-4.17_2.6.16.21_0.13-30.3.i586.rpm
be232e269a6067bd2d936f16e6c8a3a6
tpctl-kmp-default-4.17_2.6.16.21_0.13-30.3.i586.rpm
c4c56fbf67434f5f2939dd4e85cf6108
tpctl-kmp-smp-4.17_2.6.16.21_0.13-30.3.i586.rpm
90fda039097bcb9dfea77c93321895e4
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/udev-085-30.11.i586.rpm
73a5ffcaeea72c89632f6597113fa435
usbvision-kmp-bigsmp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
749b7ec34a2cd0864cd296419bdafcd8
usbvision-kmp-debug-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
a0eb6f7674520a01b151c490dc342dc7
usbvision-kmp-default-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
37a4e14ce1ec4965f26e1326d7241762
usbvision-kmp-smp-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
5c9926a62a9e5096ce63349acbe89724
usbvision-kmp-xen-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
d2410737db46df9bada726bfc2416a2c
usbvision-kmp-xenpae-0.9.8.2_2.6.16.21_0.13-3.1.i586.rpm
694c781f29dccaa1f26fcd58c79d4371
wlan-kmp-bigsmp-1_2.6.16.21_0.13-12.6.i586.rpm
01f91c7bd6eb1ca1edf5bee04ea2786a
wlan-kmp-debug-1_2.6.16.21_0.13-12.6.i586.rpm
5a1adb87796cc4dc05dd38ff285e3408
wlan-kmp-default-1_2.6.16.21_0.13-12.6.i586.rpm
38786dc33bfa6f02d3aa1bf997d25398
wlan-kmp-smp-1_2.6.16.21_0.13-12.6.i586.rpm
0b4cbdb97296ee00c6a67179f4b4efb7
wlan-kmp-xen-1_2.6.16.21_0.13-12.6.i586.rpm
f139106bdfbc3e4faf1f4bad2a5f326b
wlan-kmp-xenpae-1_2.6.16.21_0.13-12.6.i586.rpm
14ed4ae45d2d65ad5c78581940bb353a
xen-3.0.2_09749-0.7.i586.rpm
59d56377f67d382fa5adca980a21caa8
xen-devel-3.0.2_09749-0.7.i586.rpm
2b7d4f9881b452a48abff40cf56241f4
xen-doc-html-3.0.2_09749-0.7.i586.rpm
59363777b0f98db4f96722fc95752866
xen-doc-pdf-3.0.2_09749-0.7.i586.rpm
0fa70e52865138e9644a24c036e3bda2
xen-doc-ps-3.0.2_09749-0.7.i586.rpm
ad5649957c67a8ecf5fae796fb7e40db
xen-libs-3.0.2_09749-0.7.i586.rpm
e2c1e535725b5b24cd19c51a0e8dc8f4
xen-tools-3.0.2_09749-0.7.i586.rpm
0cadd80f58357b3135825cba81785b56
xen-tools-ioemu-3.0.2_09749-0.7.i586.rpm
8387b6d495aa45270872f60aabc1c394
zaptel-kmp-bigsmp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
f7b74bcb292788f9cc5c584a01a9a47b
zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
42a59aacc105356cfa1565cad548fd88
zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
d4c16bdda9973cec6f66b6cb6216e7d1
zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
042d4daa42d5941ed5efce7d10c72c25
zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
cd8d8148c21c5acb1739ba3467dfe119
zaptel-kmp-xenpae-1.2.4_2.6.16.21_0.13-10.3.i586.rpm
d4b664e27c6c8ec2eb4154d73b498171

SUSE LINUX 10.0:
Intel-536ep-4.69-14.6.i586.rpm
f1a8ba80079b81685d9426f09b64bb99
kernel-bigsmp-2.6.13-15.11.i586.rpm
d2390ddccfaad103ae4d80fb59a73800
kernel-bigsmp-nongpl-2.6.13-15.11.i586.rpm
f45d3b6f92c7e07be02ac7c45d6d2420
kernel-default-2.6.13-15.11.i586.rpm
d5ddb4d7c4e729712abd31c16d1d00fb
kernel-default-nongpl-2.6.13-15.11.i586.rpm
5354e1fa6372548bb998eacbb438fc9d
kernel-smp-2.6.13-15.11.i586.rpm
f358de08699bfbd90c2a96b63d04ebe9
kernel-smp-nongpl-2.6.13-15.11.i586.rpm
002fde4bfccb45b7b928f2d6cb175702
kernel-source-2.6.13-15.11.i586.rpm
8dcc7463d139b67f4058196077fd77bb
kernel-syms-2.6.13-15.11.i586.rpm
82ef2c427e48d71d088bccdd3090051d
kernel-um-2.6.13-15.11.i586.rpm
4cada92e8b362a18a6cb2e7b9dad1867
kernel-um-nongpl-2.6.13-15.11.i586.rpm
a5c1fb1d7ba62cb7d47e1ebc68b6043b
kernel-xen-2.6.13-15.11.i586.rpm
e2e53924d3dd90ae1ed6fd6cf65e5a98
kernel-xen-nongpl-2.6.13-15.11.i586.rpm
cd9bad0b01cdad5dc70d4fbc82352af0
um-host-kernel-2.6.13-15.11.i586.rpm
d0af6de05ca9a572cf9ea25ba702867c

SUSE LINUX 9.3:
Intel-536ep-4.69-10.7.i586.rpm
fb640315cdcf43f2ffd7f6f51828eccc
kernel-bigsmp-2.6.11.4-21.13.i586.rpm
474bcbd50739da47319f62ea9efac697
kernel-bigsmp-nongpl-2.6.11.4-21.13.i586.rpm
f591a96ebe1788fa7503ed80b35f4b9b
kernel-default-2.6.11.4-21.13.i586.rpm
00c44c19362f6256a95496de93500524
kernel-default-nongpl-2.6.11.4-21.13.i586.rpm
cc6aebefa35a4bca90cc22cf4522fe97
kernel-smp-2.6.11.4-21.13.i586.rpm
00dfc63513b64f9aa6534ee0424a4d42
kernel-smp-nongpl-2.6.11.4-21.13.i586.rpm
cfab4802ff6cdb522494690a53166bbe
kernel-source-2.6.11.4-21.13.i586.rpm
a8b6221034411bf63093fa7c2b8e6ad4
kernel-syms-2.6.11.4-21.13.i586.rpm
267669734dc0e95e2bdf96a4c9ce5321
kernel-um-2.6.11.4-21.13.i586.rpm
31d0831adab64bbf848433c2b0b68db8
kernel-um-nongpl-2.6.11.4-21.13.i586.rpm
751dad14c0578d2522cad557ad00f13f
kernel-xen-2.6.11.4-21.13.i586.rpm
32523934ffd726b303cd7650168262f2
kernel-xen-nongpl-2.6.11.4-21.13.i586.rpm
5155c42795497c07f27093677b011d2c
ltmodem-8.31a10-7.7.i586.rpm
23bb3edd5eccdbfdba9abcfb1c356a7c
um-host-install-initrd-1.0-50.7.i586.rpm
7e0d874eacfb71671ef2cce0287f8cb0
um-host-kernel-2.6.11.4-21.13.i586.rpm
7e561721fad94a6d744864bce5dd551e

SUSE LINUX 9.2:
Intel-536ep-4.69-5.16.i586.rpm
bb0396417107d32fed4997d7a70b37f9
kernel-bigsmp-2.6.8-24.24.i586.rpm
bde42b68a6ed0eb3c3633ceb125f348c
kernel-bigsmp-nongpl-2.6.8-24.24.i586.rpm
ef4c6540b77fa646649fdc473039a569
kernel-default-2.6.8-24.24.i586.rpm
740f4bb7cbb56cf55360bf4a1edf32fe
kernel-default-nongpl-2.6.8-24.24.i586.rpm
19313402b487108c4ef883dfcb7aa03e
kernel-smp-2.6.8-24.24.i586.rpm
4acac5fcacfb83abe2326c880a9ab94b
kernel-smp-nongpl-2.6.8-24.24.i586.rpm
d5649a51a381106a7733bfe093c71bc4
kernel-source-2.6.8-24.24.i586.rpm
0415a737781d2906b3d380ccf3946dc7
kernel-syms-2.6.8-24.24.i586.rpm
5bf912e55bb0fb5aec445eafa0075784
kernel-um-2.6.8-24.24.i586.rpm
f56fe753c10797532e7239b9a68e97d6
kernel-um-nongpl-2.6.8-24.24.i586.rpm
a2f9dbcacff96e556ff82cc716417ed5
ltmodem-8.31a8-6.16.i586.rpm
5a062eb816a7a4638f9261ba98767dd2
um-host-install-initrd-1.0-48.15.i586.rpm
9e31db031ba57f3af146a17d9597986f
um-host-kernel-2.6.8-24.24.i586.rpm
0f9837aa3de9897a5983af8726615339

SUSE LINUX 9.1:
kernel-bigsmp-2.6.5-7.276.i586.rpm
ceba69d6952612d1cc2434b8da1cbf75
kernel-default-2.6.5-7.276.i586.rpm
1c1d3680df647755a922fbf8028b58b9
kernel-smp-2.6.5-7.276.i586.rpm
217d25d2d474d4f7eb974d966fd4c926
kernel-source-2.6.5-7.276.i586.rpm
aabe3bb797ddaacc5f19b144d37b4be5
kernel-syms-2.6.5-7.276.i586.rpm
d87358add6318890f66d0de62a2bcbea
ltmodem-2.6.2-38.24.i586.rpm
d8eadd159248361b0a9ee0e0cb3f4168

Platform Independent:

SUSE LINUX 10.1:
apparmor-admin_en-10-7.5.noarch.rpm
8a183fb7f7b69af041e1f6f4a5b46d68
apparmor-docs-2.0-17.5.noarch.rpm
827b675a6c216ec32902183c79433479
apparmor-profiles-2.0-34.9.noarch.rpm
f6ae693557732b8f27eba4dfde4a9eb4
apparmor-utils-2.0-23.5.noarch.rpm
acb673a77bfe60d6d036e60f5b19764b
yast2-apparmor-2.0-27.5.noarch.rpm
83c76ee5e56846ec7545d5fe0bf25098

SUSE LINUX 9.3:
kernel-docs-2.6.11.4-21.13.noarch.rpm
1ebb82bcf1316493ca8b4355db932d0b

SUSE LINUX 9.2:
kernel-docs-2.6.8-24.24.noarch.rpm
e7d6caf8cb9c23119d181b98efaf7ba7

SUSE LINUX 9.1:
kernel-docs-2.6.5-7.276.noarch.rpm
ece4fe625855902c637abe9f1252f6d4
kernel-docs-2.6.5-7.276.noarch.rpm
556b8059e67605daa9d789907db10778

Power PC Platform:

SUSE LINUX 10.1:
apparmor-parser-2.0-21.5.ppc.rpm
f630cd2887055b6442706a229bd79f34
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/audit-1.1.3-23.3.ppc.rpm
8aa6cc2de24e4bb4d4c74307986ca354
audit-devel-1.1.3-23.3.ppc.rpm
f7e3b65e5754df2c7e3f81387f4dfce5
audit-libs-1.1.3-23.3.ppc.rpm
5c6861388a938b80c266a1932fac85d0
cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.ppc.rpm
ac3295455812a021ad5f239ab56287cb
cloop-kmp-iseries64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
8dd405813e14d317831dc5b6a657d55d
cloop-kmp-ppc64-2.01_2.6.16.21_0.13-22.3.ppc.rpm
c59982049da9a11ebf26e3ac477442ab
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/drbd-0.7.18-3.3.ppc.rpm
fdcc271b40cfc14985951fb94154c0ef
drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
16e8bf1e04d4574ea116fd8a9617c5ed
drbd-kmp-iseries64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
0e648065b5442763404396603e1c2782
drbd-kmp-ppc64-0.7.18_2.6.16.21_0.13-3.3.ppc.rpm
a7dcee57666e9ca61d4dea5b4953655b
kernel-default-2.6.16.21-0.13.ppc.rpm
e37ef749e89e0785dee5cb0bb1efa740
kernel-iseries64-2.6.16.21-0.13.ppc.rpm
1623a8a97419a2272027aa166430860a
kernel-kdump-2.6.16.21-0.13.ppc.rpm
76c9fdf080d3697ba2b97a18b3c031f8
kernel-ppc64-2.6.16.21-0.13.ppc.rpm
181a7668969c02dd217f77f795f88214
kernel-source-2.6.16.21-0.13.ppc.rpm
216d42cb7f22a423bb62b1af3124ca5a
kernel-syms-2.6.16.21-0.13.ppc.rpm
2442412bc80a1301b3cf4a8e491e1a1d
lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
583928fdc71ae4a8790bc1d04be092d0
lirc-kmp-iseries64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
0c617c35763488383d31e09776981ffc
lirc-kmp-ppc64-0.8.0_2.6.16.21_0.13-5.1.ppc.rpm
b64cd82811dc7d7f279b87e5dbc51276
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/mkinitrd-1.2-106.15.ppc.rpm
70ca7ada636755d8ba1d159d38cfb98c
multipath-tools-0.4.6-25.9.ppc.rpm
0df9787c0d34cdde227e76218accbafb
open-iscsi-0.5.545-9.13.ppc.rpm
8b19b4b4d10841fc0edcfad8bead5321
pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.ppc.rpm
108d8f2c2b660bfd805ef76820a8a835
pcfclock-kmp-ppc64-0.44_2.6.16.21_0.13-15.1.ppc.rpm
0dab492bad5d5815c678df2987ebae62
quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.ppc.rpm
61cd65508674e71fe619bec2fb9026f3
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/udev-085-30.11.ppc.rpm
4571532a54b7e221448b324ca994e4d1
wlan-kmp-default-1_2.6.16.21_0.13-12.6.ppc.rpm
079bb0db9f9396f5daf64cb00246bbd1
wlan-kmp-iseries64-1_2.6.16.21_0.13-12.6.ppc.rpm
835067ccf55f42ed34cff08e9b6ffce4
wlan-kmp-ppc64-1_2.6.16.21_0.13-12.6.ppc.rpm
3bd1bb0e1150dc95f94858e956f4dc22
zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.ppc.rpm
068e5337926200f980be3dcb67c2eb98

SUSE LINUX 10.0:
kernel-default-2.6.13-15.11.ppc.rpm
8351be43b5c3896df83c63ba65cfeb5a
kernel-iseries64-2.6.13-15.11.ppc.rpm
7747fa43d835b3320b3a3fa54f235013
kernel-ppc64-2.6.13-15.11.ppc.rpm
18c443c60f7829c88bd821fb865046ac
kernel-source-2.6.13-15.11.ppc.rpm
06cf812b56183eb5156e344db7fe310c
kernel-syms-2.6.13-15.11.ppc.rpm
2f44c721c158dd9f56a497223b54431d

x86-64 Platform:

SUSE LINUX 10.1:
apparmor-parser-2.0-21.5.x86_64.rpm
060873e93856d7954d33812f2cb26c13
audit-1.1.3-23.3.x86_64.rpm
a3149bc43d13af6a808efce907f11b53
audit-devel-1.1.3-23.3.x86_64.rpm
48d28c73627c036e60fbcba5daa889ff
audit-libs-1.1.3-23.3.x86_64.rpm
dee93d43a783ebf6ca16202a1382118f
cloop-kmp-debug-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
dc2bb193b8f30b6d3444aa9371826d23
cloop-kmp-default-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
df81804f31015ce6baf0eec3354a75b9
cloop-kmp-smp-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
a9f20351762bccc74ebc1df2d5b5adf4
cloop-kmp-xen-2.01_2.6.16.21_0.13-22.3.x86_64.rpm
1013121fc139ace267bb33f3b10e114d
drbd-0.7.18-3.3.x86_64.rpm
44025e09c1571e735f82d4d60e71fc0b
drbd-kmp-debug-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
3331bff87496d9e9afa1fb83919b1111
drbd-kmp-default-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
2b85c2e78d4ecb2e0e21f7908c7257f6
drbd-kmp-smp-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
bd3e07b7356c64b541be792c97868d19
drbd-kmp-xen-0.7.18_2.6.16.21_0.13-3.3.x86_64.rpm
35ee253010ade83dc595c8a27f308335
hbedv-dazuko-kmp-debug-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
d845a7df15fdb571df85b31e6a667005
hbedv-dazuko-kmp-default-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
a3f8918d10b82a61042f3044a695e877
hbedv-dazuko-kmp-smp-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
82f20f84b58d676999e5e909336c66b7
hbedv-dazuko-kmp-xen-2.1.1_2.6.16.21_0.13-3.1.x86_64.rpm
c5584a0cbbc8d0fef477afe195dcf277
ivtv-kmp-debug-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
fe4d8f6e1297c41dd04b1dc6473d47c1
ivtv-kmp-default-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
1a03723657be633a35162e31940ae647
ivtv-kmp-smp-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
66875b4b65f2e48df27491a2d0d93de9
ivtv-kmp-xen-0.7.0_2.6.16.21_0.13-12.1.x86_64.rpm
0e8f15d78033b73a96440736820e5cbb
kernel-debug-2.6.16.21-0.13.x86_64.rpm
d237873002ea1a5501f3b61f76b6903c
kernel-default-2.6.16.21-0.13.x86_64.rpm
f44e5a424121b256b3c1287997ba4061
kernel-kdump-2.6.16.21-0.13.x86_64.rpm
170baeb8f839651598ddbcbf93aa4670
kernel-smp-2.6.16.21-0.13.x86_64.rpm
d32a01850aebf660e1a740c2f9b9927a
kernel-source-2.6.16.21-0.13.x86_64.rpm
8002fc7b644f2c64c258400f29050e5d
kernel-syms-2.6.16.21-0.13.x86_64.rpm
9c7549f01707a434c0247f73eb9b0152
kernel-xen-2.6.16.21-0.13.x86_64.rpm
9ecef38e308f2e4ef644e832fee15a8b
kexec-tools-1.101-32.17.x86_64.rpm
121b57cabdcb74e90f3992ad2a7843c8
lirc-kmp-default-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
84ef08317d3bcf6552ec57a0487349e0
lirc-kmp-smp-0.8.0_2.6.16.21_0.13-5.1.x86_64.rpm
64898d1f8f8e98ab43f2d52a10bd3a52
mkinitrd-1.2-106.15.x86_64.rpm
49bee58e184fe82330f0b9c1720a97f4
multipath-tools-0.4.6-25.9.x86_64.rpm
e01336dc8e630ffa76918c4e487dba9f
ndiswrapper-kmp-debug-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
fe54b39f60d50c48f25d9e756212991e
ndiswrapper-kmp-default-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
2906ea2b8c781eda354a83bcd668ea10
ndiswrapper-kmp-smp-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
16ee21b17dcd1e5c3db212d9b9f281ba
ndiswrapper-kmp-xen-1.10_2.6.16.21_0.13-19.3.x86_64.rpm
59f733077e5cf2d208802599111778b1
novfs-kmp-debug-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
6bce5050ab3d11597c129b2a86a22599
novfs-kmp-default-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
b033fe6ec282491fc8227718a2ccddb3
novfs-kmp-smp-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
e0a234ff6261e1b3d28afcfb1b09cb52
novfs-kmp-xen-1.2.0_2.6.16.21_0.13-9.2.x86_64.rpm
e262ada6e83e80b394f84deb18d367c7
omnibook-kmp-debug-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
1ba9eece36909166f129f3a05c5b0a34
omnibook-kmp-default-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
0c61295b0a053475f6a31619f761d67d
omnibook-kmp-kdump-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
28c2c42e81b473b533800c26fb161db8
omnibook-kmp-smp-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
b490a216fad445f0499dabb64307de75
omnibook-kmp-xen-20060126_2.6.16.21_0.13-3.1.x86_64.rpm
f72df7eddb5a3f417878e5680fab5cd1
open-iscsi-0.5.545-9.13.x86_64.rpm
c51104356caeb53cd189079bfc8f7bb4
pcfclock-kmp-debug-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
5487af5844e98b6a3d51394671d19fd5
pcfclock-kmp-default-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
5547a66c2172a1e37cf83352a2971bf7
pcfclock-kmp-smp-0.44_2.6.16.21_0.13-15.1.x86_64.rpm
fbd677b5ef2747de9f038efb55ff5162
quickcam-kmp-default-0.6.3_2.6.16.21_0.13-6.1.x86_64.rpm
01f40956b13ece3ffac89484d99784f1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/udev-085-30.11.x86_64.rpm
149b04dbd960e9c853578c5357ce142d
wlan-kmp-debug-1_2.6.16.21_0.13-12.6.x86_64.rpm
3356f6a1d58c98344b354fc556a7ed32
wlan-kmp-default-1_2.6.16.21_0.13-12.6.x86_64.rpm
3fcf84553e3039c1ad1659681fa59c4f
wlan-kmp-smp-1_2.6.16.21_0.13-12.6.x86_64.rpm
c9c8d7587bd5922fb0d87d066f402d72
wlan-kmp-xen-1_2.6.16.21_0.13-12.6.x86_64.rpm
dffd5eab1d7e201b8802b96bd5b39030
xen-3.0.2_09749-0.7.x86_64.rpm
8f08be21026a337d1331288d0ed33192
xen-devel-3.0.2_09749-0.7.x86_64.rpm
9e9806f40e6ab9961543306d1ee236cf
xen-doc-html-3.0.2_09749-0.7.x86_64.rpm
7ef2bf1b781916f5a778804380ad921b
xen-doc-pdf-3.0.2_09749-0.7.x86_64.rpm
04e9674d20bbbf8785b5cfcc2131e7da
xen-doc-ps-3.0.2_09749-0.7.x86_64.rpm
a0b1277b24d9c2c0a46557bb6f4e4473
xen-libs-3.0.2_09749-0.7.x86_64.rpm
b5eb3c8eb334d8f09bce0ec67d9e9ca7
xen-libs-32bit-3.0.2_09749-0.7.x86_64.rpm
9955c0c24e174ec83f46ce52e76ab98e
xen-tools-3.0.2_09749-0.7.x86_64.rpm
523ccc5bee4cfdbb9b1b7080f9a05649
xen-tools-ioemu-3.0.2_09749-0.7.x86_64.rpm
08159c0dd7ea459396d5de547e75d7f0
zaptel-kmp-debug-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
b2499ba0ba2367da270f690b75ee40c8
zaptel-kmp-default-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
45d781cffb80f6d8bd5d58be522aa2f4
zaptel-kmp-smp-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
7ad169812c058a21be7b49fd86fd9237
zaptel-kmp-xen-1.2.4_2.6.16.21_0.13-10.3.x86_64.rpm
f9c0361874d265be3e6e2e8ef66ae635

SUSE LINUX 10.0:
kernel-default-2.6.13-15.11.x86_64.rpm
b85489f0ad8cc9bbb5728c64e7c8fc2f
kernel-default-nongpl-2.6.13-15.11.x86_64.rpm
4e132e7adbada352e112c64a3c9f2408
kernel-smp-2.6.13-15.11.x86_64.rpm
087fea22e9d90ef98337c30f55318db3
kernel-smp-nongpl-2.6.13-15.11.x86_64.rpm
e6f47d4bd1fda55cabf5a59b62c2e183
kernel-source-2.6.13-15.11.x86_64.rpm
0a6f8350214710e2f600ac204eb1a0a5
kernel-syms-2.6.13-15.11.x86_64.rpm
5fff86f3834368fa34c5e32855f44d0c
kernel-xen-2.6.13-15.11.x86_64.rpm
f87081d87e0f9c7d3ba627309107bddf
kernel-xen-nongpl-2.6.13-15.11.x86_64.rpm
b8d9b58c238d533550ccce278dad30f0

SUSE LINUX 9.3:
kernel-default-2.6.11.4-21.13.x86_64.rpm
43f6fb67727c88b0f4aeda733120ac84
kernel-default-nongpl-2.6.11.4-21.13.x86_64.rpm
bf333ee5088cc7f5a4888530557fb719
kernel-smp-2.6.11.4-21.13.x86_64.rpm
be4142bb00d29a20b18159add573fc74
kernel-smp-nongpl-2.6.11.4-21.13.x86_64.rpm
8c47ed2a4949b3e9aaa046830472b2ef
kernel-source-2.6.11.4-21.13.x86_64.rpm
1d373c25c0590d223f17e1d9feba1f6c
kernel-syms-2.6.11.4-21.13.x86_64.rpm
f21817e9293fc603914958b0eed983ca

SUSE LINUX 9.2:
kernel-default-2.6.8-24.24.x86_64.rpm
c4d600c67fa16520e30e4f306c2f174c
kernel-default-nongpl-2.6.8-24.24.x86_64.rpm
1e5a69fdd455ba1c9317b5386b4f887d
kernel-smp-2.6.8-24.24.x86_64.rpm
37a138694706fdd8229d51f75256ca74
kernel-smp-nongpl-2.6.8-24.24.x86_64.rpm
9ede22ac6b4119995d4c8ea6329f2851
kernel-source-2.6.8-24.24.x86_64.rpm
9c28c19a989ad975e26c3c4210ab93df
kernel-syms-2.6.8-24.24.x86_64.rpm
ef6477f4e8d9386e8c14e5f33cab6e15

SUSE LINUX 9.1:
kernel-default-2.6.5-7.276.x86_64.rpm
a1ec9ed29e7b844639fb264c0c051f79
kernel-smp-2.6.5-7.276.x86_64.rpm
9c18e347968bc60d4e32b67557c1830b
kernel-source-2.6.5-7.276.x86_64.rpm
205bd72a791fd24589330c152f73d18b
kernel-syms-2.6.5-7.276.x86_64.rpm
63ada2081021bc1307c6153ccd043b87

Sources:

SUSE LINUX 10.1:
apparmor-admin_en-10-7.5.src.rpm
43095bf3f55a08d8064a021d6aaa1db7
apparmor-docs-2.0-17.5.src.rpm
abe9f0dc42be1ce5c7590f357d9d134b
apparmor-parser-2.0-21.5.src.rpm
7fe00c347fec96fef49bf0463b209210
apparmor-profiles-2.0-34.9.src.rpm
c6b49655962246afcc288c2df8eed31f
apparmor-utils-2.0-23.5.src.rpm
5257e473bc5e8a6f7c4dccd5e6a9ae55
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/audit-1.1.3-23.3.src.rpm
cf3d5c02a37d737c0178c72ea84ee203
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/drbd-0.7.18-3.3.src.rpm
f7c33143e57fb99cf0b392096d9f7d44
kernel-bigsmp-2.6.16.21-0.13.nosrc.rpm
9359a72d2f9016a61beb36f6b2f0fa28
kernel-debug-2.6.16.21-0.13.nosrc.rpm
4a26cacb10c6dbf2706fadc4b83535e4
kernel-default-2.6.16.21-0.13.nosrc.rpm
235efd96d5f7c6ccfc9a398cc8d27108
kernel-iseries64-2.6.16.21-0.13.nosrc.rpm
40dc372c825056205aa0c1cc1de2473b
kernel-kdump-2.6.16.21-0.13.nosrc.rpm
ed77128c1b3433a22c12cb78491d9353
kernel-ppc64-2.6.16.21-0.13.nosrc.rpm
d322ff866d8534ad3bc53e6dabc3443d
kernel-smp-2.6.16.21-0.13.nosrc.rpm
a4aeb424592289ef78edcdd6cd1449db
kernel-source-2.6.16.21-0.13.src.rpm
9173110fbf71bfb007b9a560e3a9bad6
kernel-syms-2.6.16.21-0.13.src.rpm
02cdf335631f2da95056cba8eda0f165
kernel-um-2.6.16.21-0.13.nosrc.rpm
1324aec2bfd8c3530e8f90088cc25c81
kernel-xen-2.6.16.21-0.13.nosrc.rpm
1250728306b9b3253ae82afedf0f1e4a
kernel-xenpae-2.6.16.21-0.13.nosrc.rpm
f193f3d82e8b0aa15d7ab13a081a7cf2
kexec-tools-1.101-32.17.src.rpm
3374197c18ba7324995f433a939fbe54
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/mkinitrd-1.2-106.15.src.rpm
ddf61f16d38e997d85fd04fdf64eaa02
multipath-tools-0.4.6-25.9.src.rpm
261e2516378e1e6596f9ad767a0594bc
open-iscsi-0.5.545-9.13.src.rpm
852e15549b54733414a667631052840b
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/udev-085-30.11.src.rpm
330f5f4e04d9448b023301d3ff332305
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/xen-3.0.2_09749-0.7.src.rpm
9adfc5f7c109b6c7f206d2765b99f1ec
yast2-apparmor-2.0-27.5.src.rpm
279b8397e1cd4fd829b12f09018f46cc

SUSE LINUX 10.0:
Intel-536ep-4.69-14.6.src.rpm
4b3fb42d44b1cf10ab6d4ede6bb67fa0
kernel-bigsmp-2.6.13-15.11.nosrc.rpm
e05d21d1ad9f1c3ea3268dde157fe13b
kernel-default-2.6.13-15.11.nosrc.rpm
f10fad044c2193fa6261096b223db611
kernel-iseries64-2.6.13-15.11.nosrc.rpm
3190b4017784a56bb412971d6ed06a1f
kernel-ppc64-2.6.13-15.11.nosrc.rpm
bcfbd7b1edbc5a97d9fda3f540d0be9d
kernel-smp-2.6.13-15.11.nosrc.rpm
b590965d0190dfe933b8e3572a190706
kernel-source-2.6.13-15.11.nosrc.rpm
00a4a6bcab31204089ec8464b070ecf9
kernel-source-2.6.13-15.11.src.rpm
790f0f0352d0f3cceb730a4e06f1951f
kernel-syms-2.6.13-15.11.src.rpm
0c017619952331561adfbed8399d7aff
kernel-um-2.6.13-15.11.nosrc.rpm
c2ed71e73606a5330f55870b8f1d7d38
kernel-xen-2.6.13-15.11.nosrc.rpm
9fcc6eb7846ddd324f4c88a9f1a99eea

SUSE LINUX 9.3:
Intel-536ep-4.69-10.7.src.rpm
e84f71edcbbad93da19fca50936e457f
kernel-bigsmp-2.6.11.4-21.13.nosrc.rpm
c2d704c30248e369c1256c9cbda9c792
kernel-default-2.6.11.4-21.13.nosrc.rpm
a83446d1d83069403cf167da49f7e4ac
kernel-docs-2.6.11.4-21.13.src.rpm
515752e1ce2951bf3338664c6db1e93f
kernel-smp-2.6.11.4-21.13.nosrc.rpm
2227766974f9d279173ff67adac2846a
kernel-source-2.6.11.4-21.13.src.rpm
a7eb9d1dde2fbf036057c3eea7da228f
kernel-syms-2.6.11.4-21.13.src.rpm
bd62cf4acca249292569a439d1b95a08
kernel-um-2.6.11.4-21.13.nosrc.rpm
7f5d2e691cf0e2373b85895e7518a1ff
kernel-xen-2.6.11.4-21.13.nosrc.rpm
f637f470f98d0c2ed239dae6d57461b8
ltmodem-8.31a10-7.7.src.rpm
a070d16b8d8f48d7df10f4a2a7553746
um-host-install-initrd-1.0-50.7.src.rpm
a4df9d5558c21e322565bb837443b249

SUSE LINUX 9.2:
Intel-536ep-4.69-5.16.src.rpm
df33c271d1a488f4b546947c9100e856
kernel-bigsmp-2.6.8-24.24.nosrc.rpm
4baaed24bac712a743c68e6da5328bbd
kernel-default-2.6.8-24.24.nosrc.rpm
a12e6479c058a95c5c057359df1f87ac
kernel-docs-2.6.8-24.24.src.rpm
d49b746c707e82b7552e09ca752b012c
kernel-smp-2.6.8-24.24.nosrc.rpm
2e4370a418fb2cd663e19f1b5722e8d2
kernel-source-2.6.8-24.24.src.rpm
ddb880da28744d6906698a6d71772b9a
kernel-syms-2.6.8-24.24.src.rpm
be826c69b6a717786bc4a42d4558d666
kernel-um-2.6.8-24.24.nosrc.rpm
73f298756b8c260db19f66045702de42
ltmodem-8.31a8-6.16.src.rpm
929a46b7e2e7045c182909134c90f764
um-host-install-initrd-1.0-48.15.src.rpm
933712007872a733e4f8f2f7a2d6040f

SUSE LINUX 9.1:
kernel-bigsmp-2.6.5-7.276.nosrc.rpm
86501653c20812d977ea23f47af5c9d3
kernel-default-2.6.5-7.276.nosrc.rpm
6fc2656d5c81821db987ccfa26ad51ea
kernel-docs-2.6.5-7.276.src.rpm
8541534925706aa2063d874f14a365a6
kernel-smp-2.6.5-7.276.nosrc.rpm
c9a6e3ee6a98005ecd4710a8b0bc8c4e
kernel-source-2.6.5-7.276.src.rpm
523fd5b4a12c8c666818ea94e9e699e3
kernel-syms-2.6.5-7.276.src.rpm
660abce3f8e14427bbaf17e3fa01d115
ltmodem-2.6.2-38.24.src.rpm
d259fef3b0115765990fb4e58cee0e40
kernel-default-2.6.5-7.276.nosrc.rpm
77411e0e5b44ae7ca78bc0e9ed77e646
kernel-docs-2.6.5-7.276.src.rpm
da439bf54800360273231d0a62e00f72
kernel-smp-2.6.5-7.276.nosrc.rpm
862a7fafdee7df50a02aceac09f86017
kernel-source-2.6.5-7.276.src.rpm
61a48f3900f2c1d2fd389dff0566225d
kernel-syms-2.6.5-7.276.src.rpm
cd0906f0fc78df823b65df1b6de63944

Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

- Announcement authenticity verification:

SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.

To verify the signature of the announcement, save it as text into a file
and run the command

gpg --verify <file>

replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:

gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team
<security@suse.de>"

where <DATE> is replaced by the date the document was signed.

If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command

gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

- Package authenticity verification:

SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.

There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:

1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement

1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command

rpm -v --checksig <file.rpm>

to verify the signature of the package, replacing <file.rpm> with
the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.

This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.

2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command

md5sum <filename.rpm>

after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.

- SUSE runs two security mailing lists to which any interested party may
subscribe:

suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<suse-security-subscribe@suse.com>.

suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<suse-security-announce-subscribe@suse.com>.

For general information or the frequently asked questions (FAQ),
send mail to <suse-security-info@suse.com> or
<suse-security-faq@suse.com>.

=====================================================================
SUSE's security contact is <security@suse.com> or
<security@suse.de>.
The <security@suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________

The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.

SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.

Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)

mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRMd4lXey5gA9JdPZAQI79gf/R9BbReJKlkRL8YMn8TOrWJXc4sJ1M2xA
SGQV4vq7cuhYPoyiW9TANnRn/w57iBIrwZWUtg4atSENOhjaZrjm8nwiHoSp1xZn
u+iM57hbt38CiPt06CzLf0DrC9vKh7znHhTOXh0/8QeQA+gGF0g1z+LHcmxECkom
JFcZ82lz7jKknTycH8ySo09o25eGUrfhzmpzPb8JLglUUpZ4tXaWN+OJG0c7RiWl
fN8xyq9zyVjxK4uLHwWtIjAUvT3mriJdJU7Snr+11H/mkJEq3Of8LobMFKVVKPTQ
7YweB4E0KwsMBIJpweeT6x+nXEupxtAlKkhBlZpX/9vgmdUjdjZa0w==
=qXhX
-----END PGP SIGNATURE-----

--
To unsubscribe, e-mail: suse-security-announce-unsubscribe@suse.com
For additional commands, e-mail: suse-security-announce-help@suse.com
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung