Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

[SECURITY] [DSA 1929-1] New Linux 2.6.18 packages fix several vulnerabilities
From: dann frazier <dannf () debian org>
Date: Thu, 5 Nov 2009 17:51:43 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
Debian Security Advisory DSA-1929-1                security () debian org
http://www.debian.org/security/                           Dann Frazier
November 5, 2009                    http://www.debian.org/security/faq
- ----------------------------------------------------------------------

Package        : linux-2.6
Vulnerability  : privilege escalation/denial of service/sensitive memory leak
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2009-1883 CVE-2009-2909 CVE-2009-3001 CVE-2009-3002
                 CVE-2009-3228 CVE-2009-3238 CVE-2009-3286 CVE-2009-3547
                 CVE-2009-3612 CVE-2009-3621

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service, sensitive memory leak or privilege
escalation.  The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2009-1883

    Solar Designer discovered a missing capability check in the
    z90crypt driver or s390 systems. This vulnerability may allow
    a local user to gain elevated privileges.

CVE-2009-2909

    Arjan van de Ven discovered an issue in the AX.25 protocol
    implementation. A specially crafted call to setsockopt() can
    result in a denial of service (kernel oops).

CVE-2009-3001

    Jiri Slaby fixed a sensitive memory leak issue in the ANSI/IEEE
    802.2 LLC implementation. This is not exploitable in the Debian
    lenny kernel as root privileges are required to exploit this
    issue.

CVE-2009-3002

    Eric Dumazet fixed several sensitive memory leaks in the IrDA,
    X.25 PLP (Rose), NET/ROM, Acorn Econet/AUN, and Controller Area
    Network (CAN) implementations. Local users can exploit these
    issues to gain access to kernel memory.

CVE-2009-3228

    Eric Dumazet reported an instance of uninitialized kernel memory
    in the network packet scheduler. Local users may be able to
    exploit this issue to read the contents of sensitive kernel
    memory.
  
CVE-2009-3238

    Linus Torvalds provided a change to the get_random_int() function
    to increase its randomness.

CVE-2009-3286

    Eric Paris discovered an issue with the NFSv4 server
    implementation.  When an O_EXCL create fails, files may be left
    with corrupted permissions, possibly granting unintentional
    privileges to other local users.

CVE-2009-3547

    Earl Chew discovered a NULL pointer dereference issue in the
    pipe_rdwr_open function which can be used by local users to gain
    elevated privileges.

CVE-2009-3612

    Jiri Pirko discovered a typo in the initialization of a structure
    in the netlink subsystem that may allow local users to gain access
    to sensitive kernel memory.

CVE-2009-3621

    Tomoki Sekiyama discovered a deadlock condition in the UNIX domain
    socket implementation. Local users can exploit this vulnerability
    to cause a denial of service (system hang).

For the oldstable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-26etch1.

We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.

Note: Debian 'etch' includes linux kernel packages based upon both the
2.6.18 and 2.6.24 linux releases.  All known security issues are
carefully tracked against both packages and both packages will receive
security updates until security support for Debian 'etch'
concludes. However, given the high frequency at which low-severity
security issues are discovered in the kernel and the resource
requirements of doing an update, lower severity 2.6.18 and 2.6.24
updates will typically release in a staggered or "leap-frog" fashion.

The following matrix lists additional source packages that were rebuilt for
compatability with or to take advantage of this update:

                                             Debian 4.0 (etch)
     fai-kernels                             1.17+etch.26etch1
     user-mode-linux                         2.6.18-1um-2etch.26etch1

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Oldstable updates are available for alpha, amd64, hppa, i386,
ia64, powerpc and s390 architectures. Updates for other
architectures will be released as the they become available.

Source archives:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-26etch1.diff.gz
    Size/MD5 checksum:  5514957 b9cb3b1e1ba1196b9020e6d07d48b752
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-26etch1.dsc
    Size/MD5 checksum:     5673 4ba2595893287a7b82713ca182aad7be
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
    Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060

Architecture independent packages:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-26etch1_all.deb
    Size/MD5 checksum:  3721660 836e780dd306ee60318d8ac1c28087eb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-26etch1_all.deb
    Size/MD5 checksum: 41474520 7457b0e444adb6b31dbcda82768671cd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-26etch1_all.deb
    Size/MD5 checksum:  1852976 ec11d9e2967a87b27fac807f80218d0e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-26etch1_all.deb
    Size/MD5 checksum:    58896 e7dc19b1c3f0a22c1764420642117fa8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-26etch1_all.deb
    Size/MD5 checksum:  3593482 146e26a9c17bfa1a0a1fa198afdf1c70
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-26etch1_all.deb
    Size/MD5 checksum:  1091166 7a089920e547412d07cf1ef44e47bbb1

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:    58290 7a1661641c432bc5a1e442a71f0584ac
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:    58254 223e25b49b1ce3fefe9934ecdda7cec4
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum: 23374558 fc6fad80b66536f0c86fe4a4923057fa
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:   266914 bd1cb44848eb7ed46418783e958046de
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:   267502 b719376ff7b69b31e59f49010c249d17
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum: 23440762 aace7bef32f7f7f69e1aeed69d191c41
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:   266308 228979a449e897802d4089909eef0326
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:  2978226 214923bbb5171e2a3daa23ed31240118
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:   267100 60048c2f207f0b00b1fab86639f3c276
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum: 23393346 1fcae90244756e9b1ed37b08a8e39b99
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum: 23752762 c6b5c665617a937c6caee0558daa8b2d
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch1_alpha.deb
    Size/MD5 checksum:  3001856 cb672b346cd9b30717e4446ee2545fff

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:  3339600 83ef8191115cf0c23599b2ad45da661c
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum: 15279100 dba0ecedc142a8f29c08ff3cb35fc9e5
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:  3362362 7acf6afbec42d7e386e4e99f45e07849
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum: 16822140 04e89e226683aee6fc0f5e2d2751e258
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:   277136 04ba98f1750e31f17a52caa0add3e419
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:  3196356 37e16a42ebf900a63d15ec1c47bd2a2a
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum: 15266172 647285195e9651e86fc78f47ca3e6aa3
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:  1687964 2556db55e5438dc01309d7d461f91ee3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:  3173540 5e0fd0af39da8904a5fc459e00fe1592
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:   276536 ac228fd76c2a64910f1194c39f5dd9a5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:   274660 9817c928baacf675542085e0387cfedc
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum: 16868682 d99a5ffc0a0c88dee5f8c279e3f96f64
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:    58278 4825706649861dcc9afd8438f961ec6e
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:  1656646 633e8373c64bb27bc283e87300ebe6cf
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:   276056 60aec7d94ae1a1afa21cc68d5b7d3c53
  
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:    58254 8bb6069f2f74da9b2bb5603898dc22e3
  
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:    58240 51d240b42f43c2cb30c31f5c4bf2117c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_amd64.deb
    Size/MD5 checksum:    58254 31e336851095fea2499e594987acea4b

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum: 10563254 4486c3660f904e4bd439c370b7f97c69
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum: 11814740 f178d4aa3358d09a492436d29dbee5cb
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:   202308 42a4b6b6b9c2f711d4c3b932353457fb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum: 11404596 9bd75cb26f23cc0c012dbcc1458c547f
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum: 11005460 01d3a246f1ffe6f368fa6ca9f4548e97
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:  3026810 ef214434dcb13fe3bdd684bf580a6b9b
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:   203070 d50c921e10f3dd82ff85287acaf0b14f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:   201556 da0a211d54dcd3e34fa29514c9934f9d
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:    58368 9917c0b22afe4c440ec64ff6d2a608e4
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:   201912 163590408b3e663b5f8cfae14e3c89a5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_hppa.deb
    Size/MD5 checksum:    58338 58f6a43a14a89d67bb46c796e8bde247

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   290694 8a08177d6d4f46a20086b489ce4decf2
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   280544 0ffbb9bc4aee76a067cebcec6f31f62e
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   287894 831999c67686f31d2346b0fa6b4948aa
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16543512 c0b9fdc137151b96ccb8198fab8b5f72
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16931792 b73f3867a2efef757fcd111916116105
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 14401768 eb0e34a9dfc17344c471b158faeab021
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:    58386 9ef707bff12f1cdb495a075c13325564
  
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:    58324 a00b5e3696278aa2d9c59f16267e3d06
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16326580 3ad3c0068e6343b6e5f70f3c44fdb3d5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   289228 4fcd19b2eb92b4550dc4a7673acc4f62
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16645286 1b2290466641e1d9ef3ecf942180fe79
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:  3215828 0c99ba0dd4abce66cda2fe6c554ccc03
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16517286 a729d0b07130c615d0d32d7b2ac46852
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   289284 183af751e23717e0ac5821f60959e5ad
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 14392520 cc51caf6cedda77521b7ee9065478392
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   288014 c4834561b492ff42175353c524e0cbd1
  
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:    58340 7c463341e612b3159e0032aaf62ab5e1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16477446 5829e6f2dce15ae1f3f74ca4d4180847
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   291792 74558945d364674729b71b4d2598d1c8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:  1304666 d9f7fb52fe8d29a9880ebc697eaae90f
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:  3239372 a7e8ba983a1e45176d33b86871e3940e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:  3117812 36cc1af70a13016e79224a3f90981ac8
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:  1332688 a1c7f6d7435eaeb22c4e7097611602e5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   278926 cf2ec90e9c683c7c5904e76145b2b562
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:  3231506 8e9ff0b708e2e616072f569f0682fa11
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum: 16604666 4d7eb157fa109072d21ec472bbbb46f1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:   280110 d34163dab810a30572c7c1a29b9efdb6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_i386.deb
    Size/MD5 checksum:    58326 bd8f5323a48ba297f6f404a4f26fd864

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum:    58254 d64ce41c696ae0af6e65348111b0e1c2
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum:    58276 509dcd2833bd560ed6dccffc0a448593
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum:   259696 9e187526ddd2342af180682ab502f302
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum:   259718 b670f97d9bd044492111b7698ed228c3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum: 28023040 9c2dbc349ec7702f781f978f27987da9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum:  3087206 3638b390791d5053b67b060e6a124866
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-26etch1_ia64.deb
    Size/MD5 checksum: 28194506 228765e996a15ef56fc2cb94e74abeeb

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:  3462292 f3f1c68ba029943c6054421c1ba23059
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   261230 26a45e4c0a77f21af0e5a6ffb0dc2b63
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:    58266 f717cc289546c2037e4ca18aa630ceb9
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:  3486460 4c5d5df532d84da56f78e47ce6262d60
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   262664 e499f6e0e4278f5d4263c9a952877624
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   263770 d12d5f3fce934b3db4dd29d5349d84a4
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 15240084 96adc4183855af04aaeca7db1d37a27e
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 17113852 9db05c81e32ef07f342eb54374c6ac6e
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 16727566 dfbc08d63a91ba7bef73dfca238559f7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 16506028 0f65a31aecb306f281348ad410174926
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 17068826 bc0941830a8d7369abaf876837a0c81e
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   262882 d5d2a01011e0a9efea7a7b2c0cbacc41
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 18433752 23a6d8183e781a43469daf3cd7769fcb
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   237826 90097f02a1ed0a29b81fe3bc64259696
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:    58312 6330638237601d3ea55b2a80d1c54540
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum: 18384182 18eabc40e998896c8f77243e84f99458
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   254332 4ac0852bf3ba527f890f828ecd749284
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-26etch1_powerpc.deb
    Size/MD5 checksum:   262220 a5ee6d47da04555615ad2bab7f646b13

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:   148246 96f1a25db3b6aa699af3ad7185a96bd2
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:   149402 44a4ec702fc2410f733aabe494c0f4e4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:   148624 78919a54c4a93dbf395369a106c76b5b
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:    58276 133b1b15cca9cb34e07eae4f3ec4a3db
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:  5410288 dd1b3737c133081f4b512c2a1ecb1cf6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:  5626808 5b7dc2c64fac5988d6070a1cddeb19f3
  
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:  5672368 f31471a55f12bb17eade213d7672cb80
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:  2971470 e546925e4309b61b6b598de04b6a1e5a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:  1445974 f80e8929c0406cbae86ba2bdf6c611e2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:    58256 3c413237e42a72c9b70f58cb65278ce9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch1_s390.deb
    Size/MD5 checksum:  2948300 f57e56f38edd5977cf95012c373f9519

  These changes will probably be included in the oldstable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce () lists debian org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFK83KvhuANDBmkLRkRArSkAJ9j5GzWPxH7ooBKs8LsNUuHqJX6mACggefc
1yS24k5hkTFNJYNpO7XsGkA=
=qEzS
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • [SECURITY] [DSA 1929-1] New Linux 2.6.18 packages fix several vulnerabilities dann frazier (Nov 06)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]