Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2010.0847 New Linux 2.6.26 packages fix several issues 20 September 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux-2.6 Publisher: Debian Operating System: Linux variants Impact/Access: Increased Privileges -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2010-3081 CVE-2010-3080 CVE-2010-3078 CVE-2010-2954 CVE-2010-2492 Original Bulletin: http://www.debian.org/security/2010/dsa-2110 Comment: This advisory references vulnerabilities in the Linux kernel that also affect distributions other than Debian. It is recommended that administrators running Linux check for an updated version of the kernel for their system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ---------------------------------------------------------------------- Debian Security Advisory DSA-2110-1 security@debian.org http://www.debian.org/security/ dann frazier September 17, 2010 http://www.debian.org/security/faq - - ---------------------------------------------------------------------- Package : linux-2.6 Vulnerability : privilege escalation/denial of service/information leak Problem type : local Debian-specific: no CVE Id(s) : CVE-2010-2492 CVE-2010-2954 CVE-2010-3078 CVE-2010-3080 CVE-2010-3081 Debian Bug(s) : Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-2492 Andre Osterhues reported an issue in the eCryptfs subsystem. A buffer overflow condition may allow local users to cause a denial of service or gain elevated privileges. CVE-2010-2954 Tavis Ormandy reported an issue in the irda subsystem which may allow local users to cause a denial of service via a NULL pointer dereference. CVE-2010-3078 Dan Rosenberg discovered an issue in the XFS file system that allows local users to read potentially sensitive kernel memory. CVE-2010-3080 Tavis Ormandy reported an issue in the ALSA sequencer OSS emulation layer. Local users with sufficient privileges to open /dev/sequencer (by default on Debian, this is members of the 'audio' group) can cause a denial of service via a NULL pointer dereference. CVE-2010-3081 Ben Hawkes discovered an issue in the 32-bit compatibility code for 64-bit systems. Local users can gain elevated privileges due to insufficient checks in compat_alloc_user_space allocations. For the stable distribution (lenny), this problem has been fixed in version 2.6.26-25lenny1. We recommend that you upgrade your linux-2.6 and user-mode-linux packages. The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update: Debian 5.0 (lenny) user-mode-linux 2.6.26-1um-2+25lenny1 Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - - -------------------------------- Stable updates are available for alpha, amd64, armel, hppa, i386, ia64, mipsel, powerpc, and sparc. Updates for other architectures will be released as they become available. Source archives: http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-25lenny1.diff.gz Size/MD5 checksum: 7975777 f39bbdb91ea404d5174d636e3722c995 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-25lenny1.dsc Size/MD5 checksum: 5778 76122adfa3afe005deb3399383a2bd32 Architecture independent packages: http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-25lenny1_all.deb Size/MD5 checksum: 48768982 07edfb93c4b92a09d816c7142bdca0ca http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-25lenny1_all.deb Size/MD5 checksum: 112362 26c3562b8492b990a07741994b54d5ff http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-25lenny1_all.deb Size/MD5 checksum: 4629662 f7a91bed6e26fd5a36cb0d882df15892 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-25lenny1_all.deb Size/MD5 checksum: 2961806 6992f6d3a88e41e804e1d1179b6f9c43 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-25lenny1_all.deb Size/MD5 checksum: 127628 b7c6d712c237cae69a3ab3efca80cf11 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-25lenny1_all.deb Size/MD5 checksum: 1775764 46f01e171d2686b95d916e7713b4186f alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 3549986 07802097454a9b2390589322ae5fdd0d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 369380 510a2218c6555a8252a067875d04a266 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 29256966 c802037b5c8ec55577b407833d082761 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 368168 c0371024df5627494dc52608c1e8103d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 746228 e82d527378541628d7fa8900392397e1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 368502 851afa03887c911d720537a7d1912ba6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 28538350 4de6c7b1ef426eab39f3c2c072db66b2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 28554916 9d6d6c595baf1cd65347f179345aa31c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 111792 dea8e7654a358026b4d20584a6dffdd0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-25lenny1_alpha.deb Size/MD5 checksum: 111814 ae09bcf59bcc6760263c4ea6aa433f97 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 388790 7c86a9dd48e5a33e4c8e1b5c2444d9c3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 111808 e2b9702e9fb841a96b58cb54a781ff79 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 1810904 732babcb7b1553e9ca820af09eb5e751 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 3858242 96e1a893526e375449669a5f8223da3d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 754576 2bcb5ad8d085122f09f511e889748733 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 3726100 ccce34f02e2a830104b8ab382ccc99bd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 392518 61772c13e9b02a27f5e95537d35c2bb6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 19315868 c1f6fe11f2dcbb9eb1af125ccb9f1ade http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 3758716 8d3eb9917ddace77306a548996805673 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 21104878 ea349768d9a3ffe0ab369b02e917a101 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 3781818 f994d959cedda9345be916f4f312f2ca http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 20952030 f36fba80058e5f7b234c6ee36150deae http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 111764 920541f7b72027e0da4bfc4aa63beee3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 111778 69b6d2bf2a8c278b19dedb5fa6aee4eb http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 393222 1f4f1e0c552efcbf170e91256bc68f95 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 20933388 a0a65295aa7af4e66b55de4f5a127944 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-25lenny1_amd64.deb Size/MD5 checksum: 398324 7de369ae359af5f1352af23059645f94 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 11407714 a761f7bce6ef511ddd2276a988a466fe http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 370450 07e6cef2d938c10d130371639edb2122 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 9614650 3ffea17a7f9bd745de670e7b3b2503f7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 4140842 502d2fe0bc4d81e1cba4dcb98ebd1f60 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 338478 469db33c30338d535fa9a7e528469f67 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 11689112 0ffd863b5e7c662d4f6d2bf2f59a4ff6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 111854 fb76d6121dedbb8ec8b33e1b01b03315 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 367108 88e0cd3b33e009b25a125e364310d1f2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 752636 ba29e2c2cae476e8e6b9510af225f017 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 111890 14e2af7a33d2109cc137dc09decf2789 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 363932 f8f941697bb5acbfb06545da94e547ce http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-25lenny1_armel.deb Size/MD5 checksum: 12449996 d9fa768a2d39d1bc70371f08f18b03b2 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 15791418 3ce7b2434ff4ee44cbb73843798f07b8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 304368 8755bd46656aa44a511fb0029d4894ac http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 303570 6447225e2c3a9d654fff7e78ce4ba237 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 304970 d5ea8e0c886512a289f5da570621e6ea http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 17134742 044c504ee53718a19cacf4f9b4d37eae http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 302674 a7060c482662a37d76f8ddaa3959727b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 111812 9a31f11a9bd9639597d49274d4962784 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 17683214 a01357633250b3f66683cf5c23c90140 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 3600256 8a691b65e874666bec4b9a7203374660 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 111788 3f0e0ad2f10d5f0d92e0b79188a49ae2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 764326 bb90e85d9dd992258a72a9c5aaec5b5e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-25lenny1_hppa.deb Size/MD5 checksum: 16391814 59f5ff30b08f5ed187a0ed90093c2d00 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 111906 1c995ded6f8492e88b7e9ab3414499de http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 1598086 c93c8f80ce38d5dc8317d425d478a871 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 20413948 dfb5c9d2bbb2c50fed543c0f7bce2634 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 18201338 45e0560c8d129a1e124d39b13585b22e http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 111844 0e88c53388199724dbd1929597b8bcfd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 413204 18a8ca0d7f962fae7fd76fa4b5fc320d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 111846 ffbedc36d002ebf1f94d9dec0ce66200 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 411934 39b241f9ba99a5dba80438bcfb91d9b2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 20534326 f386b72470556ca67d6cb95142f2c401 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 21029192 81e1714cf6cb1f769bda8a1dd3600bd4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 412460 51b76eb19b3994180db52057ec18c149 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 3949316 7ff8df817cb1dab2307555c7235f18d6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 413416 138d1ef5e16fa04ce6af8a0a8dbfb830 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 400960 bb801a4771cab63544ce46737e89880f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 20508562 793ec95764c505fee44b15cc2e223ccf http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 3867512 89accc978a4d8971b053da75444d1724 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 3843962 1efbb8b49ca19dd4168e67b2c85a0340 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 768644 2279eb4b90cf87159f9cca7851ce307c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 399658 b55ef231a667680f5dadb286e3228690 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 20352826 aefd977e7d594e3eedbd5fad21cb3ce8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 3809078 98463846b73b525e9312b73987a20be5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 20383054 fb4dad3198c6688a224d7cc627ebc595 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 20684446 b82b26d8f81b1a4fc71061103f904a92 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 420374 a2b5537a922ea21b34c20bfc9b3db1ae http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-25lenny1_i386.deb Size/MD5 checksum: 413274 d0868663d8b734e4d99d610eff666231 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 365440 ff879931fee914ed85cb033836f84c65 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 366924 ebda80908653305fb5a6a6899d1331a0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 365778 07accd56af5543c0fef20cbb3b068998 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 34536240 86a3e7624fbe6acc3a5d0d851a593dd1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 34362466 8874bf431329a32b774dcbab0e41e338 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 34467922 9ef85dcf49cbe4353e6c9744e9560439 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 3727594 85a140aaf943602a389ac4759fb72f34 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 365138 60e70a32ba8fa65b1e5182377648177d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 111784 5e279e9fcc80bfdaec02ea1f51b418de http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 3762334 31791b660bdcc85f0539406f2c0558be http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 768138 122e994060ec48929dc4e4f5993ae7d8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 34286140 39e897ae2f3b84d15eb8d5c605fe258f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-25lenny1_ia64.deb Size/MD5 checksum: 111814 da3e8b1483d254ad6940ac7952fa9b1e mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 111836 3facf15fcb9e0a88f975dc3beae8696a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 19623042 d492982ccce2bf7f25d6f7cfd4bfeed2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 747276 055da45cbcc6f7c9ed60aa0394729d7a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 28490352 5adb323a9481ec08ce1994feaf294149 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 22966726 52751e384989910d555c877d0ae43937 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 300520 9da06382dffe3584409610a8b16a1711 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 19634438 7650cb94c949ad29438c2be916d32ac4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 3897008 8a6e8f8277e57ccf3d9a255bedc669bf http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 299946 c20bad9ee5b97a68cbd7b8bb0b0c3e03 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 354226 61603c54f33879f8731adeee447538bf http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 15004398 3c8e36a1745c5ea5d0295f35edbdf0c6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 355330 cdbc0aa4114a9b446973ea9ddd65d252 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 295028 2b248539505946e829161c41247fe6ba http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_mipsel.deb Size/MD5 checksum: 111788 d0cdb75f35ccbf7d50236c4263c42696 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 23682314 54c8c509e9c42bb7a2563e707e3bc752 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 3855052 80b26ea5df78659e28b99b976a988d30 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 372728 660ab7e4cdcdf5e93cb769256d3d93e7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 3890440 d42abc4ac1b6350e2bddb629b3fac9ba http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 761070 a18d6bd2c78261b796d10d3d7293524d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 373504 791bf4dab71c3a52ec214004bece814f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 23714616 03f7a29bbe48563efd27b3942a9b2518 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 377812 2249dda34712ccab222fd66e7ee30be2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 23285306 348f9f5b16f5531ff7db6df7f84a13e6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 371300 870a09f0c2cfa745c50127f480fa06ef http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 111850 aa040723eb09f3f756dc72d5cedfd2c2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 23536242 1f13f2174d3fa5906ae33fe5c38fa952 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 111894 0e5017b2e7e284fcb71600b515e24944 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 380094 01a28641358fd8f82ec1a874983da0db http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-25lenny1_powerpc.deb Size/MD5 checksum: 23594128 ab3016e68b95ea59706a6939c7cd388d sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 3824368 1d1fedbb7562c394db96812ec09f007d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 111790 543eeff824aa5a76fd950384076eae5c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 306798 6183c37b09cfcb83c3877a2bad962134 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 14634462 3327721f9131905880c9fc43315629a3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 308886 c1ee4104734d2ecef10e905ce857dee8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 803352 60dd14d0f949a6ee484ace2e47a8d064 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 3789714 24090045b578ca83e8b5f763b07cbef0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 111810 e0e4c6827133df59b68b1e78a2554303 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 308612 ce0427567c4c300d1da0d9a1c8ec28be http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 14611760 5db83e9585e6b9ecf5564e521799c30b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-25lenny1_sparc.deb Size/MD5 checksum: 14290950 a038e19bde88404a3bdae760922401ef These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iD8DBQFMk4ybhuANDBmkLRkRApOZAJ41F/fXUvTxRIRFQRDxXyN+UsiaogCglxQg oT2vAODO9/cd0Z0gpqprhM0= =AgM8 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMlukq/iFOrG6YcBERApDWAJ9cBYA2NRyO2wmBH+uNI9hGQK0l+QCgj0Iu YS2tuXF46GX3sENaArROZLc= =2YAE -----END PGP SIGNATURE-----