-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2009.1111
           New Linux 2.6.24 packages fix several vulnerabilities
                               29 July 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux-2.6.24
Publisher:         Debian
Operating System:  Debian GNU/Linux 4
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account      
                   Increased Privileges            -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Denial of Service               -- Existing Account      
Resolution:        Patch
CVE Names:         CVE-2009-2407 CVE-2009-2406 CVE-2009-2287
                   CVE-2009-1961 CVE-2009-1914 CVE-2009-1895 
                   CVE-2009-1633 CVE-2009-1630 CVE-2009-1389 
                   CVE-2009-1385


Reference:         ASB-2009.1023
                   ESB-2009.1091
                   ESB-2009.1059
                   ESB-2009.1031
                   ESB-2009.1001.2
                   ESB-2009.0572
                   ESB-2009.0527

Original Bulletin: 
   http://www.debian.org/security/2009/dsa-1844

Comment: This bulletin contains two (2) Debian Security Advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ----------------------------------------------------------------------
Debian Security Advisory DSA-1844-1                security@debian.org
http://www.debian.org/security/                           Dann Frazier
July 28, 2009                       http://www.debian.org/security/faq
- - ----------------------------------------------------------------------

Package        : linux-2.6.24
Vulnerability  : denial of service/privilege escalation
Problem type   : local/remote
Debian-specific: no
CVE Id(s)      : CVE-2009-1385 CVE-2009-1389 CVE-2009-1630 CVE-2009-1633
                 CVE-2009-1895 CVE-2009-1914 CVE-2009-1961 CVE-2009-2406
                 CVE-2009-2407

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2009-1385

    Neil Horman discovered a missing fix from the e1000 network driver.
    A remote user may cause a denial of service by way of a kernel panic
    triggered by specially crafted frame sizes.

CVE-2009-1389

    Michael Tokarev discovered an issue in the r8169 network driver.
    Remote users on the same LAN may cause a denial of service by way
    of a kernel panic triggered by receiving a large size frame.
    
CVE-2009-1630

    Frank Filz discovered that local users may be able to execute
    files without execute permission when accessed via an nfs4 mount.

CVE-2009-1633

    Jeff Layton and Suresh Jayaraman fixed several buffer overflows in
    the CIFS filesystem which allow remote servers to cause memory
    corruption.

CVE-2009-1895

    Julien Tinnes and Tavis Ormandy reported and issue in the Linux
    vulnerability code. Local users can take advantage of a setuid
    binary that can either be made to dereference a NULL pointer or
    drop privileges and return control to the user. This allows a
    user to bypass mmap_min_addr restrictions which can be exploited
    to execute arbitrary code.

CVE-2009-1914

    Mikulas Patocka discovered an issue in sparc64 kernels that allows
    local users to cause a denial of service (crash) by reading the
    /proc/iomem file.

CVE-2009-1961

    Miklos Szeredi reported an issue in the ocfs2 filesystem. Local
    users can create a denial of service (filesystem deadlock) using
    a particular sequence of splice system calls.
    
CVE-2009-2406
CVE-2009-2407

    Ramon de Carvalho Valle discovered two issues with the eCryptfs
    layered filesystem using the fsfuzzer utility. A local user with
    permissions to perform an eCryptfs mount may modify the contents
    of a eCryptfs file, overflowing the stack and potentially gaining
    elevated privileges.
    
For the stable distribution (etch), these problems have been fixed in
version 2.6.24-6~etchnhalf.8etch2.

We recommend that you upgrade your linux-2.6.24 packages.

Note: Debian 'etch' includes linux kernel packages based upon both the
2.6.18 and 2.6.24 linux releases.  All known security issues are
carefully tracked against both packages and both packages will receive
security updates until security support for Debian 'etch'
concludes. However, given the high frequency at which low-severity
security issues are discovered in the kernel and the resource
requirements of doing an update, lower severity 2.6.18 and 2.6.24
updates will typically release in a staggered or "leap-frog" fashion.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- - -------------------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.diff.gz
    Size/MD5 checksum:  4046697 0c540aa51d64fd0f41fefda0370a7d57
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.dsc
    Size/MD5 checksum:     5117 8149bb152305e615760fd5accc516b17
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz
    Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af

Architecture independent packages:

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb
    Size/MD5 checksum:   931690 8230f79880ab579b104e9b34029cc97d
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb
    Size/MD5 checksum:  1572166 59bdbfc8850a9eb4c7f09229f8481a04
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb
    Size/MD5 checksum: 46892520 c736086affec0e829b80074008edc96d
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.8etch2_all.deb
    Size/MD5 checksum:    97696 ac7c8e4af4d15f8e77817f3a2060621e
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb
    Size/MD5 checksum:  4469630 76391a2afe93b14ef942260a2ab0f6c4
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb
    Size/MD5 checksum:    82766 fccf13a8baefeb96443c00718b47178a

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum: 26737560 705e6c1f456e523e4cd6e2199247ad8a
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum: 27342178 b22b7be9f15a3fcd569e83b0981c7b2b
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum:  3454340 5d9c4195f523265e691a73d165a32bd5
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum:   331144 9b199341a9906f69b92956bee989678f
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum:   330548 2e97270481c6406f4703f7ffc642a306
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum:    82254 6ef54422427a87fb7013208abbb90bfe
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum: 26758348 3fa44a2c192d5296abff11160c4143f7
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum:    82234 2d73cbb156467a0e189b66d64d725957
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb
    Size/MD5 checksum:   332176 8abd6e28989d5ffa359dbdf523b8802a

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_amd64.deb
    Size/MD5 checksum:    82232 f31859776e8c538793ce7bc12e4d16e6
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb
    Size/MD5 checksum:    82238 0dd51e0668293dc4a112ba7c177a2d62
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb
    Size/MD5 checksum:   355216 e912a184ffa55eefcbf4d075575f956b
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_amd64.deb
    Size/MD5 checksum:  3649934 25d6d6f81163cd422b987cffe8555482
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb
    Size/MD5 checksum: 19596152 128c3dcd4b54fbca2a8cccf553b15c15

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:   308764 081a21f64a1939858fd628b2b17b1e9d
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:    82362 a02c06864fb8adb347c7b3b83707ec71
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:  3937452 4296fde893b88cba41a5164cd6c68266
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:   297832 882e93119837e060496995474bfbde0c
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:    82388 5682b9cb3c9efdf951541c5e951858d5
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:  9356202 12691f5684650f5f808b4ccc3d77e6f6
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum: 10777668 be1c3aa597e81f449a1712c059b6d219
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum: 10786276 fdfef0d9f0a0f740cdf096efe4076849
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb
    Size/MD5 checksum:   306278 243cc2aef642ad3dc3e6faa9f5b7d2ac

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:   259166 403c84cc8eec53736e11babcd7133c36
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:    82390 c1e6ec2b43d6dc4849ab58fcca7708fd
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:   257800 dcf392b46aaabf4187d0b739d7b3f0b6
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:    82356 e67f07544c8505aebf46d0fc5cc6ff9b
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:   258558 a2e28e8a24b42aa4f092218fdb7b24b0
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum: 14371812 91a757a164d87fcca9b7c8dcf9737e52
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:   261468 72a0d875029ef878bcfa7734ad0e3221
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum:  3444724 e4cbc7652241146662a324980caf28e8
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum: 14830286 ee2c1dd21c02e82c845897b92fc44d18
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum: 13846760 3133b7187049be153f3d946556c58d5a
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb
    Size/MD5 checksum: 13335008 a71482e5f95d01ae60ef6f9e84851905

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum: 19345260 c8d133c7df467610a2b58b02d437f140
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum: 19349370 99465914e158a8a8095d704c7a4eca58
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:    82350 eb75675cf418a8fe18a45cf78e113b14
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum: 19589510 ed83c2d0ba92a0f4b5fb5daed6b86d5c
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:   347746 23befd72e069faf404ede7a276b78311
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:  3647494 9cf283a4c89c8281db35e5fb2ace4335
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:    82384 199633269844e3e36cf936f5a63857a7
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:   361018 4f7299551139e79ad329057ff07de93d
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:   359956 5272e0df584721713692ccb80e8fdc45
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum:   361502 4c9a0586154b5fce6d50610d6728bf75
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb
    Size/MD5 checksum: 19278068 41f6b91dceeaba5592a15bdbb4170c3a

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum:    82360 e96d164aa97cbda5c4e0d4a4d8d47298
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum:  3570154 a7bdb15fd5dc46ea33b570390700255a
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum: 32289122 8a66a1efccab804aece0f9c9f9a0c2c3
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum:    82378 11c070123743f3060aee864a6fa7621e
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum:   322394 7e68b691385f67de57eca947718b3cf3
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum: 32112122 81952edc15d24552bc7e0e250d4e4c2f
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb
    Size/MD5 checksum:   322756 0332b3131abca0dde23a3980e3269d6a

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum: 22151540 85f675d6aa5e858c776b25ed7b55fd01
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum: 17152584 968f51589e2246eb98d54f8f7a0deac3
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:   246524 7d37dee7fa5f20d5484a054697944a4a
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum: 11958562 189d907c882ca1f971e5df5b020db861
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:   246320 9b22546464feae45ee05c1318ce4eeb1
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:   214790 9f3182d818ff7b6a05993763a6120725
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum: 17168120 bc71f4391f0b74712a77ce0a98104c42
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:    82240 56ffbcabce3c1df699ab5005b86b5fcb
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum: 10524568 1dcc5f02fea750b73b3d26bbf9436744
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:   309414 2f3e51dd53a0aee437acd14822bdc812
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:    82294 9d3e3e23c0fc8a0f1e1841e28fd3a2e2
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:  3803692 496de2fac6b2631145112d3df8c30a74
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:   309366 ad8430704237cac6706abefb3cb3a66a
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum:   225310 6f208c9d5eada9b92d3e98530a7421ab
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb
    Size/MD5 checksum: 27775866 480af1976cfb2ad886bbeab57828e0a9

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum: 26985726 697670a3bb624d4d3d78f46f3dd1ffa0
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum: 16630534 64876417bfc90be839f742b7f3df4017
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:    82296 3b389589e0d350fd94e1e6a55064b597
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:   246006 6b907d81792642929e73f8f7138a0686
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:    82244 06ea877ec50d7981c308674e878de0fd
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum: 21734936 1f58a04e3f3e233fc379f7585b37f67c
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:   309876 33999e485bc68c26f1355c34591fa9d1
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:   246316 f5ee5c81b6f69590e7483c63914aa4f1
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum: 13317230 d5c0090dd1f3487c1a1b98e663d302a9
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:  3803662 c04871193e6cd5fe88e7d757fe94dc15
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:   246138 83d394f1c4638687b1bd71213d6fc9fd
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum: 16566994 4ad893a3f64121974125e7df7a246c32
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb
    Size/MD5 checksum:   308542 d1aa85d73a85243f9e11e6d319829560

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum: 17459600 932f0c6e71fa2a92bcbf91245d4a6f34
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum: 19195098 3894f438fae8ccd897ae1b193e05a06c
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum: 19486104 e186a5e57fc6ef416a9f0611b4e32b00
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:   321892 920d908f2b7f39a4ea245a452707de9c
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:   321508 053a1e68eb59bc3616762c77c478b77c
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:  3672616 9480b5733676cd5d73e984cd6b36cdb2
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum: 21169994 225176293c099a0a66a6e427f8f342c9
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:   321100 ed5daac657617ab8ea09dedbbd5825e9
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:    82240 d5758f3021b63ba5a46f4bb59a0264bd
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:    82278 68134af3769b6654c610701382a41932
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb
    Size/MD5 checksum:   294694 6e01dfd311f1094cb5cf39e6ab13030f

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:  1502142 d742c3ccecaeae89dd72efa337ad8d77
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:   194364 95a4fc8d1329f3926c95d0d866ea95c1
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:  3429940 46b5705e72023ec8eabbeaaae179df0f
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:   194060 0c71ba7ea8c4108e88ce439c83e36101
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:    82228 f6a160399eb50aed5c7ce0a802977eec
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:    82242 20fa5214b693fd929327b65dff5ec749
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:  7200766 c6697bcd7109bad0fd2742368bfc7173
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb
    Size/MD5 checksum:  6950228 2c118466985f0d41c074e3d7ae019d4e

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum:    82354 917940e7cc2b2ae64b7b13119c8d5cdf
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum:   263544 e8b14218397904ab5f792a659c713900
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum: 13317316 74c832fd75da1e42442c1fc2fb985454
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum:  3650988 92f721bff0660a92cff31845e3db2b09
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum:   261690 519b6d40d8fc3af21f475b10bfaef609
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum:    82374 8ff85603936f91294ec959d8fbca1db5
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb
    Size/MD5 checksum: 13019920 db00ad3ea888c38b94f6e9c2aebbd834


  These changes will probably be included in the oldstable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKb9Y8huANDBmkLRkRAuqJAJ9JqEaNUYIJm6n6iRfB3HkHYMoqIwCeNHWU
w9UeleoRb1WqaQzxsWr3CpA=
=AwpW
- -----END PGP SIGNATURE-----

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ----------------------------------------------------------------------
Debian Security Advisory DSA-1845-1                security@debian.org
http://www.debian.org/security/                           dann frazier
Jun 28, 2009                        http://www.debian.org/security/faq
- - ----------------------------------------------------------------------

Package        : linux-2.6
Vulnerability  : denial of service, privilege escalation
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2009-1895 CVE-2009-2287 CVE-2009-2406 CVE-2009-2407

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service, or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2009-1895

    Julien Tinnes and Tavis Ormandy reported an issue in the Linux
    personality code. Local users can take advantage of a setuid
    binary that can either be made to dereference a NULL pointer or
    drop privileges and return control to the user. This allows a
    user to bypass mmap_min_addr restrictions which can be exploited
    to execute arbitrary code.

CVE-2009-2287

    Matt T. Yourst discovered an issue in the kvm subsystem. Local
    users with permission to manipulate /dev/kvm can cause a denial
    of service (hang) by providing an invalid cr3 value to the
    KVM_SET_SREGS call.

CVE-2009-2406
CVE-2009-2407

    Ramon de Carvalho Valle discovered two issues with the eCryptfs
    layered filesystem using the fsfuzzer utility. A local user with
    permissions to perform an eCryptfs mount may modify the contents
    of a eCryptfs file, overflowing the stack and potentially gaining
    elevated privileges.

For the stable distribution (lenny), these problems have been fixed in
version 2.6.26-17lenny1.

For the oldstable distribution (etch), these problems, where
applicable, will be fixed in updates to linux-2.6 and linux-2.6.24.

We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.

Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or "leap-frog" fashion.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:

                                             Debian 5.0 (lenny)
     user-mode-linux                         2.6.26-1um-2+17lenny1

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny1.diff.gz
    Size/MD5 checksum:  7379386 e39e1610a5bf0ecf7213c7d0cdf2d2b8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
    Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny1.dsc
    Size/MD5 checksum:     5777 af1732ba4824c10f33f9f9d47646b71e

Architecture independent packages:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-17lenny1_all.deb
    Size/MD5 checksum:  1796746 513b2bc4b33984b4b8aee8fe5eba0eb6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-17lenny1_all.deb
    Size/MD5 checksum:   121474 6a5b4b1258d5413a289c622f53618048
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-17lenny1_all.deb
    Size/MD5 checksum: 49364258 a711fe6f43baac15f31ec8410cca0208
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-17lenny1_all.deb
    Size/MD5 checksum:  2306752 c927a4be24692ff4ba314437ad3cb858
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-17lenny1_all.deb
    Size/MD5 checksum:  4846320 eed4194a6f0c2622b89d0f4f22bce41f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-17lenny1_all.deb
    Size/MD5 checksum:   105386 b363ddaddee39208f28189904b441135

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum: 28339784 20ad51628add3cb2c07fb8998e311ceb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:   365102 8da1c0d879b2bc4262782c80daf4748e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum: 29031684 906c285dc4d53632bf4a5e66259183b0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:   104956 840b14d789cc4ba914f967e7c9570951
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:   362972 f950f072ef0f7fc0e756c9c29a9108ad
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum: 28317390 1cb8ed6ae8dcbac77691399363ba94e6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:  3541642 602567f93cdd4ddebc261d819b26aab7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:   739432 5407584de49ed3fc4ff22d17b32c9364
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:   104976 787c3541cb967daca5ee7f8fa12dd315
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-17lenny1_alpha.deb
    Size/MD5 checksum:   362518 370d72552c3218fa3f9daa536605c755

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:  3849250 806c662910b6e5f8358224a95517491a
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   104940 8724f579e8cb7109e2f39c2d0efc01f6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum: 20782346 4af003031aa49ae2c9e527fc20110be5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   393984 3c444229a2e762a0d259abf01e4516d9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   381464 7147fa4f0c4d898d842c7e4bb1833aee
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:  3716672 5cf2cdf2efa1d32344ba3504c9fabf75
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   747876 e5cdaad585e698cabf367e333c52e8a7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   387590 a4e1214d84b8882c9ec5963c9b4b04b2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:  1801534 6e44a9381919c0b1361e294f74ec1a6b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:  3749374 f7d73d3aa4afdcd8f9c305d9fc617455
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum: 20802058 4f60e31d4f3c208a484160ebf90602c3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   104946 d909937c63e4d9080164d41869b0d4db
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   104982 068d117daf5fd54cc56d226371b430f0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum: 19175182 56f1360dfafd92b7e7243beb1c7491ab
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:  3772298 2928e075ee70a25b55545d203f79adcc
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum: 20951548 8fb28c17ea59b609b8fa14ede127508c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-17lenny1_amd64.deb
    Size/MD5 checksum:   386650 01a4c39f554be935b16ade92e0d0fa59

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   744878 9c250cb6fe1d7d84d7f773b9ec219766
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum: 12430418 79e0da6e286b30f02278855c59ad21f9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:  4137286 4fe364eb5aa17e2f7b3407a1d9abc266
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   359528 e7374c28cb78ada54e4fbd96b79d588e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   104908 0f19820cade592260120ca755c6deca1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum: 11409620 b3e129e9e88a55776812aa11e08df4f0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   348034 7499d074c0558ec958cbe622e41242d9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum: 10231284 6da1c6c02dfc34141ce0f220c116e468
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   364464 1ffe9f6ea5256078bd1b7f10744311b2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   362694 aada27cb84d53a36643d0c2058c5cee6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum: 11715894 7b0861f2ca62c57e0581ab11854e1076
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-17lenny1_arm.deb
    Size/MD5 checksum:   104950 b75e7b96cb6bd06a1ab4aeddba7cd2d0

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:  9570900 96d80e107dbc42b0bde446faa7fa0ce6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   104958 c4c0d6fa513f065ab955b4d2d0be3c68
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   359970 7a3ff45a0cc61722d12957f7732a1529
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   363560 2e9f6c9c81f2e23cf08b9e5d1c4101b2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum: 12394444 850cd46b7a329802e8288c5da86c9973
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum: 11682814 1d0a0b2dda4ddc38f78d8bb127a536c3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   365874 56a9946a3e11dc26e31aaf2d6213eafa
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   745466 669720212857c6307b9b52df8c5df536
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum: 11372192 aeb7f482de47719fef3cbe2b21a4bec4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   335782 df019358a01151a224e430649851bde6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:   104994 46fcfff6c56be8fdfd8a73fbc9355e9c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_armel.deb
    Size/MD5 checksum:  4129080 eab6db71cf4761df64f89751ab8d1652

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum: 16925328 80a6af47aae8e8ded7f947e448edd5b6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum: 15615228 e5f33ccb5d4f97a929edc358959762d8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   295484 55290542f69a9ebf10db7ca5c7116999
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:  3597960 406a170179a7e024a3c8ec1d6cad3e83
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   104908 d310bceae5eb38d22a233a5e7c3cb5b6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   104942 ea8b1d0a77f89f0b8083c6ca706e8382
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   294106 5725c28f5c553f21df54e096c4be8d31
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   296666 93c636ab6db65a75d398810a3ba5dcc0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   756918 c79bea2dca9922d535f2369206234d35
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum:   294936 504bee122fa2dab9bc288a49caea66e4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum: 17470156 86fb47ed82e1418423aca47b93d734f7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-17lenny1_hppa.deb
    Size/MD5 checksum: 16203598 6caadd853fb812b8a157b4156abac638

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 18067424 4af73d71bd55c38cd241a94f1d417bf9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   402032 20f8ad1b60f90cc354ed0723871c04d4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:  3797646 9deaf2a91ad8bb665099e20823ffdf55
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:  3856254 8fdf5df6660165acb13216f382cfbfdb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20368920 2215db3313611748074728b26513a575
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20883488 95599a54f3e14ac9cd338f25655e2eaa
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:  3832372 8a87ced9a3c0c36f26d89f953698384c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   761582 c7d9abe4bdc016ecc470021cac5989fb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   403070 8da87c42b4c55b9d890dd94cf6ac620d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20395434 3bc5d02d03b6277f37bd2f2b0e797646
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   393426 78e9da0b41880b79b0e413a7f1508850
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20278236 42c6a1b6274da250b32fbe07501b394f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   389916 e46fc06bfc15cb0e04f60eff19e5165c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20220400 0786c07b87876936aa202b0701be1dd4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   104954 1c5d35cf4a3cb48eab1180acbcba4f25
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   401526 a890f3f5715a897a9036120309cb1ebd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   401880 97c2da7de8bc012ed284edb52c7abb11
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20549656 c755cd12f96f7a72265d52357058cb6f
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   104896 e544d148e74189cab781988501f6d0e7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:  1590668 5441c6506d82dc8f36e3c94c4440be4a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum: 20259056 3fba0ccdb20b378d25338ee153f7715c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   104900 8704a6aa10e0e3165badd3e89356a0d1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   403486 8f85c89d15ebe40a1c8a8c1869d3a767
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:  3937928 fa7c56c0a64e1180b96b26045039105f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-17lenny1_i386.deb
    Size/MD5 checksum:   407760 034d708d4ca1fecc2ddbefcea7034c12

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   359806 c6dbad4f3e543bfab0ed79ae02f3be61
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum: 34212812 e5d10d8c82d56b0cd85967a9eef4bf8a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   359158 63a70f6562d5de32d3e9889cf7bbbe56
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:  3722000 56a4fe165cc2967cfca976f508287933
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   359890 c0014d738db0b6090fdb244614d3522c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:  3757876 cc432914c44f40fca243b29f02e7b0a3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   761018 aac2772f35833552e7b58008aceb3cf6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum: 34275236 363b3e2271b28b74114505bcd5513a2d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum: 34039094 d27389454aa6dbb11c4ae2ecd4937e21
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   104902 e22703a7bb2493ce1a59fcd190edc740
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum: 34101932 9763b03a4d68080293010f3454bdc41a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   104942 79575f37ebdbddbd73af88917996d034
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-17lenny1_ia64.deb
    Size/MD5 checksum:   359206 957622b7fb4abcb08f07e43e84832b62

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   756260 be3ebb79edeaeaa65b920272a988d0ee
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   353154 2ec17c2dab5c5b1e648bb9e0a9becdf3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   296424 97f9fc917999e582dac2be6245aeb21d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   104910 76dddb5ea406ba48ae4c7eef8d4b16c7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum: 11530694 c026184a1b4fd1d123f37b7e16fdb1cd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:  3960608 9364b6a0c1779261b0dba48d3a45afaa
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum: 20000412 45b56e5b4acd8127551b6c223b95d644
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   296610 a795480c770984bf96416f8dfa0ab7de
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   257544 ee7be23bb19161efc336f7aa9e3f18fc
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum: 29184190 759cff9946b882952ab888dd0ec4299d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum: 19987880 941f283861b8d15e47ae3f38c5d6e9b4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   104962 4553d7ecf28187649d656b3846f22830
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   281922 3da1d5827cd217f7fb3ebc1e91d39712
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum: 15683752 e3df86684db6ebc1cf147ac503509ad4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum:   351602 2517f216db80256fc9861a038d10ba52
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-17lenny1_mips.deb
    Size/MD5 checksum: 23318574 5322cba51946c40999bb98c85c6d1fa5

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   292562 176071d4d5eb7d78a808570a389fa678
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum: 22772944 eb571dbbfb692297d9dde8eecc743eea
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum: 19383282 6deb657ec460702c52e89f321b20e328
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   740524 a48dcebe12fa791d83945a021394f8b1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:  3888698 e585dbe8562e778b1042556a921854f3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum: 19390424 f490af5439a2427c2d11f84db79373ea
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   292922 bcad310140da06c19c209939753b1b5f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   105004 3022ab6316273d6958b95e7051217a6b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   288904 0b7edf69ac75ec97004d6d2950d4624e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   347152 10f954f3d64ac8064be99e17a747ed1b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   104956 5267c3a85825e73fb7e6bddeb4b08c5f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum: 28245242 24bcab744e8a42f4f2d7119146d64fb3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum: 14935572 75c634d4445c917800ba937a883f7cb9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-17lenny1_mipsel.deb
    Size/MD5 checksum:   346492 1abec1dc4614f2f694d7df4ba644de10

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   366758 206e8d3e7884ee9ac45f072bebc135d9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   104990 3580003dc0735ce1bc568a796a26c381
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum: 23113020 60eda031d38600cba9988cd7338a3d6f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum: 23550004 26aab88dee67e0e112e8ac434d94039f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   364028 30f1e0d36f6d80cf75853f2d2f288687
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum: 23342248 0b1e45c77b7d27929e0c7f6b31c6d4de
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   371412 4b865c8865758c8cf2d50ad3f00d7967
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   365552 b3c11e8008aacca19c86e7cbb2c313f1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:  3853554 1715e740bd802a8963622d60e0c0c506
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:  3888302 9ba782b0ee75dfe9ec5c487ca46ad6c4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum: 23515280 e2e4709ceca184ca84201e9b07dbecbd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   104954 cf83ded30563ce74f5339f9f1bc4cf14
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   372304 eb0e2eec22d492a9b070965bd72d77a0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum:   754256 73f7d659d6389f7d8ba0fc22f870cf0a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-17lenny1_powerpc.deb
    Size/MD5 checksum: 23393424 4f63e3364879376aca8ad4db95d4d8a9

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:  1627134 6fa7ffb7fe8099415a06075f22dda4e0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:   227574 82447614253fb4f98c5b5b49a54ca466
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:   229566 1ca9637beb45ae5fda06a2e89b4f8925
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:  7770112 4bf5ddbed1f47b4cedf6d1c78ec584f2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:   104944 70b85b0607eee05e0ed6ced8fc24f6e9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:  7830812 ec32d591cee9dd30697242ef43afb6d5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:  3560554 51d9c535649f030fa987d11b31625c5b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:  3528064 8769db0db0689c528cee2d2dd725426f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:   228298 1a183065702aade43c83f6f3cbf72304
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:   739772 a7540acfb429f27ea93ac46d8dae9642
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:   104966 af691fc33c508f97e6491d90157f8643
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-17lenny1_s390.deb
    Size/MD5 checksum:  7482794 396d57ead9e8c0064a2146616ec8e024

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:  3778796 0d606ef3866260bbd5a8d90606f937b0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:   300912 47cca783fd541d312665b7411c55ffc6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:   301288 c2af7b6bc32dbf712ec906b958503b96
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum: 14461622 82e13857cdb03377cfd89aa464c9253a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum: 14136886 c93282b2471cb705f015f74a30ef3e0f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:   797080 7c958f70578d326b948180a689d1c433
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:   298790 ab89eedb7788f47b6dfe1be0bb641435
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum: 14481530 b05391d359198c60721160330478e495
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:   104932 d20a6ef754f1fa20293aa599c744368b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:  3813960 d9092366add55e1c7d0dec8e7c52f8da
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny1_sparc.deb
    Size/MD5 checksum:   104908 28a931d4e1171899aaced4cbc989acc1

  These changes will probably be included in the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKb9gAhuANDBmkLRkRAn1hAJ48bysNDdfY96NRFZI/mTnhB2AndgCfbjti
o2pO4Pqi8o6BC50Xz31p2+s=
=p971
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKb+G3NVH5XJJInbgRAgFwAJwOh7Do5sseZBg1Y3iBteaVGCFhLgCdF0N5
zA893d+7cZwT8LCWs+iURfg=
=bbv/
-----END PGP SIGNATURE-----