-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0847
               New Linux 2.6.26 packages fix several issues
                             20 September 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux-2.6
Publisher:         Debian
Operating System:  Linux variants
Impact/Access:     Increased Privileges     -- Existing Account
                   Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2010-3081 CVE-2010-3080 CVE-2010-3078
                   CVE-2010-2954 CVE-2010-2492 

Original Bulletin: 
   http://www.debian.org/security/2010/dsa-2110

Comment: This advisory references vulnerabilities in the Linux kernel that 
         also affect distributions other than Debian. It is recommended that
         administrators running Linux check for an updated version of the 
         kernel for their system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ----------------------------------------------------------------------
Debian Security Advisory DSA-2110-1                security@debian.org
http://www.debian.org/security/                           dann frazier
September 17, 2010                  http://www.debian.org/security/faq
- - ----------------------------------------------------------------------

Package        : linux-2.6
Vulnerability  : privilege escalation/denial of service/information leak
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2010-2492 CVE-2010-2954 CVE-2010-3078 CVE-2010-3080
                 CVE-2010-3081
Debian Bug(s)  :
                 
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information leak.
The Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2010-2492

    Andre Osterhues reported an issue in the eCryptfs subsystem. A buffer
    overflow condition may allow local users to cause a denial of service
    or gain elevated privileges.

CVE-2010-2954

    Tavis Ormandy reported an issue in the irda subsystem which may allow
    local users to cause a denial of service via a NULL pointer dereference.

CVE-2010-3078

    Dan Rosenberg discovered an issue in the XFS file system that allows
    local users to read potentially sensitive kernel memory.
    
CVE-2010-3080

    Tavis Ormandy reported an issue in the ALSA sequencer OSS emulation
    layer. Local users with sufficient privileges to open /dev/sequencer
    (by default on Debian, this is members of the 'audio' group) can
    cause a denial of service via a NULL pointer dereference.

CVE-2010-3081

    Ben Hawkes discovered an issue in the 32-bit compatibility code
    for 64-bit systems. Local users can gain elevated privileges due
    to insufficient checks in compat_alloc_user_space allocations.
    
For the stable distribution (lenny), this problem has been fixed in
version 2.6.26-25lenny1.

We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.

The following matrix lists additional source packages that were
rebuilt for compatibility with or to take advantage of this update:

                                             Debian 5.0 (lenny)
     user-mode-linux                         2.6.26-1um-2+25lenny1

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Stable updates are available for alpha, amd64, armel, hppa, i386, ia64, mipsel,
powerpc, and sparc. Updates for other architectures will be released as they
become available.

Source archives:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-25lenny1.diff.gz
    Size/MD5 checksum:  7975777 f39bbdb91ea404d5174d636e3722c995
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
    Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-25lenny1.dsc
    Size/MD5 checksum:     5778 76122adfa3afe005deb3399383a2bd32

Architecture independent packages:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-25lenny1_all.deb
    Size/MD5 checksum: 48768982 07edfb93c4b92a09d816c7142bdca0ca
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-25lenny1_all.deb
    Size/MD5 checksum:   112362 26c3562b8492b990a07741994b54d5ff
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-25lenny1_all.deb
    Size/MD5 checksum:  4629662 f7a91bed6e26fd5a36cb0d882df15892
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-25lenny1_all.deb
    Size/MD5 checksum:  2961806 6992f6d3a88e41e804e1d1179b6f9c43
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-25lenny1_all.deb
    Size/MD5 checksum:   127628 b7c6d712c237cae69a3ab3efca80cf11
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-25lenny1_all.deb
    Size/MD5 checksum:  1775764 46f01e171d2686b95d916e7713b4186f

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:  3549986 07802097454a9b2390589322ae5fdd0d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:   369380 510a2218c6555a8252a067875d04a266
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum: 29256966 c802037b5c8ec55577b407833d082761
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:   368168 c0371024df5627494dc52608c1e8103d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:   746228 e82d527378541628d7fa8900392397e1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:   368502 851afa03887c911d720537a7d1912ba6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum: 28538350 4de6c7b1ef426eab39f3c2c072db66b2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum: 28554916 9d6d6c595baf1cd65347f179345aa31c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:   111792 dea8e7654a358026b4d20584a6dffdd0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-25lenny1_alpha.deb
    Size/MD5 checksum:   111814 ae09bcf59bcc6760263c4ea6aa433f97

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   388790 7c86a9dd48e5a33e4c8e1b5c2444d9c3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   111808 e2b9702e9fb841a96b58cb54a781ff79
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:  1810904 732babcb7b1553e9ca820af09eb5e751
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:  3858242 96e1a893526e375449669a5f8223da3d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   754576 2bcb5ad8d085122f09f511e889748733
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:  3726100 ccce34f02e2a830104b8ab382ccc99bd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   392518 61772c13e9b02a27f5e95537d35c2bb6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum: 19315868 c1f6fe11f2dcbb9eb1af125ccb9f1ade
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:  3758716 8d3eb9917ddace77306a548996805673
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum: 21104878 ea349768d9a3ffe0ab369b02e917a101
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:  3781818 f994d959cedda9345be916f4f312f2ca
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum: 20952030 f36fba80058e5f7b234c6ee36150deae
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   111764 920541f7b72027e0da4bfc4aa63beee3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   111778 69b6d2bf2a8c278b19dedb5fa6aee4eb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   393222 1f4f1e0c552efcbf170e91256bc68f95
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum: 20933388 a0a65295aa7af4e66b55de4f5a127944
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-25lenny1_amd64.deb
    Size/MD5 checksum:   398324 7de369ae359af5f1352af23059645f94

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum: 11407714 a761f7bce6ef511ddd2276a988a466fe
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   370450 07e6cef2d938c10d130371639edb2122
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:  9614650 3ffea17a7f9bd745de670e7b3b2503f7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:  4140842 502d2fe0bc4d81e1cba4dcb98ebd1f60
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   338478 469db33c30338d535fa9a7e528469f67
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum: 11689112 0ffd863b5e7c662d4f6d2bf2f59a4ff6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   111854 fb76d6121dedbb8ec8b33e1b01b03315
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   367108 88e0cd3b33e009b25a125e364310d1f2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   752636 ba29e2c2cae476e8e6b9510af225f017
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   111890 14e2af7a33d2109cc137dc09decf2789
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum:   363932 f8f941697bb5acbfb06545da94e547ce
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-25lenny1_armel.deb
    Size/MD5 checksum: 12449996 d9fa768a2d39d1bc70371f08f18b03b2

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum: 15791418 3ce7b2434ff4ee44cbb73843798f07b8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   304368 8755bd46656aa44a511fb0029d4894ac
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   303570 6447225e2c3a9d654fff7e78ce4ba237
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   304970 d5ea8e0c886512a289f5da570621e6ea
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum: 17134742 044c504ee53718a19cacf4f9b4d37eae
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   302674 a7060c482662a37d76f8ddaa3959727b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   111812 9a31f11a9bd9639597d49274d4962784
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum: 17683214 a01357633250b3f66683cf5c23c90140
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:  3600256 8a691b65e874666bec4b9a7203374660
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   111788 3f0e0ad2f10d5f0d92e0b79188a49ae2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum:   764326 bb90e85d9dd992258a72a9c5aaec5b5e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-25lenny1_hppa.deb
    Size/MD5 checksum: 16391814 59f5ff30b08f5ed187a0ed90093c2d00

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   111906 1c995ded6f8492e88b7e9ab3414499de
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:  1598086 c93c8f80ce38d5dc8317d425d478a871
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 20413948 dfb5c9d2bbb2c50fed543c0f7bce2634
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 18201338 45e0560c8d129a1e124d39b13585b22e
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   111844 0e88c53388199724dbd1929597b8bcfd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   413204 18a8ca0d7f962fae7fd76fa4b5fc320d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   111846 ffbedc36d002ebf1f94d9dec0ce66200
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   411934 39b241f9ba99a5dba80438bcfb91d9b2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 20534326 f386b72470556ca67d6cb95142f2c401
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 21029192 81e1714cf6cb1f769bda8a1dd3600bd4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   412460 51b76eb19b3994180db52057ec18c149
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:  3949316 7ff8df817cb1dab2307555c7235f18d6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   413416 138d1ef5e16fa04ce6af8a0a8dbfb830
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   400960 bb801a4771cab63544ce46737e89880f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 20508562 793ec95764c505fee44b15cc2e223ccf
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:  3867512 89accc978a4d8971b053da75444d1724
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:  3843962 1efbb8b49ca19dd4168e67b2c85a0340
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   768644 2279eb4b90cf87159f9cca7851ce307c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   399658 b55ef231a667680f5dadb286e3228690
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 20352826 aefd977e7d594e3eedbd5fad21cb3ce8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:  3809078 98463846b73b525e9312b73987a20be5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 20383054 fb4dad3198c6688a224d7cc627ebc595
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum: 20684446 b82b26d8f81b1a4fc71061103f904a92
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   420374 a2b5537a922ea21b34c20bfc9b3db1ae
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-25lenny1_i386.deb
    Size/MD5 checksum:   413274 d0868663d8b734e4d99d610eff666231

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   365440 ff879931fee914ed85cb033836f84c65
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   366924 ebda80908653305fb5a6a6899d1331a0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   365778 07accd56af5543c0fef20cbb3b068998
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum: 34536240 86a3e7624fbe6acc3a5d0d851a593dd1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum: 34362466 8874bf431329a32b774dcbab0e41e338
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum: 34467922 9ef85dcf49cbe4353e6c9744e9560439
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:  3727594 85a140aaf943602a389ac4759fb72f34
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   365138 60e70a32ba8fa65b1e5182377648177d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   111784 5e279e9fcc80bfdaec02ea1f51b418de
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:  3762334 31791b660bdcc85f0539406f2c0558be
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   768138 122e994060ec48929dc4e4f5993ae7d8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum: 34286140 39e897ae2f3b84d15eb8d5c605fe258f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-25lenny1_ia64.deb
    Size/MD5 checksum:   111814 da3e8b1483d254ad6940ac7952fa9b1e

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   111836 3facf15fcb9e0a88f975dc3beae8696a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum: 19623042 d492982ccce2bf7f25d6f7cfd4bfeed2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   747276 055da45cbcc6f7c9ed60aa0394729d7a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum: 28490352 5adb323a9481ec08ce1994feaf294149
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum: 22966726 52751e384989910d555c877d0ae43937
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   300520 9da06382dffe3584409610a8b16a1711
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum: 19634438 7650cb94c949ad29438c2be916d32ac4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:  3897008 8a6e8f8277e57ccf3d9a255bedc669bf
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   299946 c20bad9ee5b97a68cbd7b8bb0b0c3e03
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   354226 61603c54f33879f8731adeee447538bf
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum: 15004398 3c8e36a1745c5ea5d0295f35edbdf0c6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   355330 cdbc0aa4114a9b446973ea9ddd65d252
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   295028 2b248539505946e829161c41247fe6ba
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_mipsel.deb
    Size/MD5 checksum:   111788 d0cdb75f35ccbf7d50236c4263c42696

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum: 23682314 54c8c509e9c42bb7a2563e707e3bc752
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:  3855052 80b26ea5df78659e28b99b976a988d30
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   372728 660ab7e4cdcdf5e93cb769256d3d93e7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:  3890440 d42abc4ac1b6350e2bddb629b3fac9ba
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   761070 a18d6bd2c78261b796d10d3d7293524d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   373504 791bf4dab71c3a52ec214004bece814f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum: 23714616 03f7a29bbe48563efd27b3942a9b2518
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   377812 2249dda34712ccab222fd66e7ee30be2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum: 23285306 348f9f5b16f5531ff7db6df7f84a13e6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   371300 870a09f0c2cfa745c50127f480fa06ef
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   111850 aa040723eb09f3f756dc72d5cedfd2c2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum: 23536242 1f13f2174d3fa5906ae33fe5c38fa952
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   111894 0e5017b2e7e284fcb71600b515e24944
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum:   380094 01a28641358fd8f82ec1a874983da0db
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-25lenny1_powerpc.deb
    Size/MD5 checksum: 23594128 ab3016e68b95ea59706a6939c7cd388d

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:  3824368 1d1fedbb7562c394db96812ec09f007d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:   111790 543eeff824aa5a76fd950384076eae5c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:   306798 6183c37b09cfcb83c3877a2bad962134
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum: 14634462 3327721f9131905880c9fc43315629a3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:   308886 c1ee4104734d2ecef10e905ce857dee8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:   803352 60dd14d0f949a6ee484ace2e47a8d064
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:  3789714 24090045b578ca83e8b5f763b07cbef0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:   111810 e0e4c6827133df59b68b1e78a2554303
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum:   308612 ce0427567c4c300d1da0d9a1c8ec28be
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum: 14611760 5db83e9585e6b9ecf5564e521799c30b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-25lenny1_sparc.deb
    Size/MD5 checksum: 14290950 a038e19bde88404a3bdae760922401ef

  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFMk4ybhuANDBmkLRkRApOZAJ41F/fXUvTxRIRFQRDxXyN+UsiaogCglxQg
oT2vAODO9/cd0Z0gpqprhM0=
=AgM8
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFMlukq/iFOrG6YcBERApDWAJ9cBYA2NRyO2wmBH+uNI9hGQK0l+QCgj0Iu
YS2tuXF46GX3sENaArROZLc=
=2YAE
-----END PGP SIGNATURE-----