lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <m1EmcjF-000ofhC__26029.6276923784$1134603694$gmane$org@finlandia.Infodrom.North.DE> Date: Wed, 14 Dec 2005 20:55:57 +0100 (CET) From: joey@...odrom.org (Martin Schulze) To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 921-1] New Linux 2.4.27 packages fix several vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 921-1 security@...ian.org http://www.debian.org/security/ Martin Schulze December 14th, 2005 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : kernel-source-2.4.27 Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2005-0756 CVE-2005-0757 CVE-2005-1762 CVE-2005-1767 CVE-2005-1768 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459 CVE-2005-2553 CVE-2005-2801 CVE-2005-2872 CVE-2005-3275 BugTraq ID : 14477 Debian Bug : 311164 319629 321401 322237 Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilieis and Exposures project identifies the following problems: CVE-2005-0756 Alexander Nyberg discovered that the ptrace() system call does not properly verify addresses on the amd64 architecture which can be exploited by a local attacker to crash the kernel. CVE-2005-0757 A problem in the offset handling in the xattr file system code for ext3 has been discovered that may allow users on 64-bit systems that have access to an ext3 filesystem with extended attributes to cause the kernel to crash. CVE-2005-1762 A vulnerability has been discovered in the ptrace() system call on the amd64 architecture that allowas a local attacker to cause the kernel to crash. CVE-2005-1767 A vulnerability has been discovered in the stack segment fault handler that could allow a local attacker to cause stack exception that will leed the kernel to crash under certain circumstances. CVE-2005-1768 Ilja van Sprundel discovered a race condition in the IA32 (x86) compatibility execve() systemcall for amd64 and IA64 that allows local attackers to cause the kernel to panic and possibly execute arbitrary code. CVE-2005-2456 Balazs Scheidler discovered that a local attacker could call setsockopt() with an invalid xfrm_user policy message which would cause the kernel to write beyond the boundaries of an array and crash. CVE-2005-2458 Vladimir Volovich discovered a bug in the zlib routines which are also present in the Linux kernel and allows remote attackers to krash the kernel CVE-2005-2459 Another vulnerability has been discovered in the zlib routines which are also present in the Linux kernel and allows remote attackers to crash the kernel CVE-2005-2553 A null pointer dereference in ptrace when tracing a 64-bit executable can cause the kernel to crash. CVE-2005-2801 Andreas Gruenbacher discovered a bug in the ext2 and ext3 file systems. When data areas are to be shared among two inodes not all information were compared for equality, which could expose wrong ACLs for files. CVE-2005-2872 Chad Walstrom discovered that the ipt_recent kernel module to stop SSH bruteforce attacks could cause the kernel to crash on 64-bit architectures. CVE-2005-3275 An error in the NAT code allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.4.27-10sarge1 Alpha architecture 2.4.27-10sarge1 ARM architecture 2.4.27-2sarge1 Intel IA-32 architecture 2.4.27-10sarge1 Intel IA-64 architecture 2.4.27-10sarge1 Motorola 680x0 architecture 2.4.27-3sarge1 Big endian MIPS architecture 2.4.27-10.sarge1.040815-1 Little endian MIPS architecture 2.4.27-10.sarge1.040815-1 PowerPC architecture 2.4.27-10sarge1 IBM S/390 architecture 2.4.27-2sarge1 Sun Sparc architecture 2.4.27-9sarge1 We recommend that you upgrade your kernel package immediately and reboot the machine. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc Size/MD5 checksum: 900 cf29dbb52e2fd25da1d4ecb8dbe5e854 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz Size/MD5 checksum: 699494 3b26bc94e734e3e9c7de8851e9e308b7 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc Size/MD5 checksum: 831 0278c9e5d78a3f0192808e89d2fa389b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz Size/MD5 checksum: 29945 c6c19bbf99fbff1d67d5216f28855755 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1.dsc Size/MD5 checksum: 577 0f7c9c24f228948824056914841278c5 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1.tar.gz Size/MD5 checksum: 828336 b38387d519bee09b40f6b706d54f60fc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge1.dsc Size/MD5 checksum: 839 99ec4f95021ee6e9fb9b98087109c0d7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge1.tar.gz Size/MD5 checksum: 32182 efdb3fde273dc5d0124d38f6d7dccbd6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc Size/MD5 checksum: 1581 0ddc89456decf24ce5d10aa79824cd5e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz Size/MD5 checksum: 97268 6aa8cd7f87e3bda01cdcd09bda96e596 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc Size/MD5 checksum: 1143 21e48f420a88976b9063e88cc7d8add5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz Size/MD5 checksum: 53267 e3c410bc8e3bdfdfe81dbc00575f62e0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge1.dsc Size/MD5 checksum: 889 a5253abf41b798233d68c8004da5049a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge1.tar.gz Size/MD5 checksum: 9791 3a5c08d227dac66ad83c75cd68c74375 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.dsc Size/MD5 checksum: 1062 d03d719f6a6cef2732ba218ae40a6770 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.tar.gz Size/MD5 checksum: 307828 fa74234db1cbd88277fcdd490b10a887 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.dsc Size/MD5 checksum: 1129 125083312667f1bdb7c62e217b41963a http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.tar.gz Size/MD5 checksum: 1462360 ab3702cbcde8976d422e32d13173c942 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge1.dsc Size/MD5 checksum: 825 ecfb13748a5231fb8e1580b7bcd99600 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge1.tar.gz Size/MD5 checksum: 8123 5e41863c13ad4b96fe90ed25abd3e33d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc Size/MD5 checksum: 1074 a22bdef307d571cd0d9a055d0752111b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz Size/MD5 checksum: 22912 2bcc7519c5da2edfe0b450b02b1c1e85 Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb Size/MD5 checksum: 3577464 3a2c82fcc546bee30fb522f28193f3e7 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb Size/MD5 checksum: 650880 2cfb0a84539c910e596abba17e7d8d48 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb Size/MD5 checksum: 31026166 857f97955b1c7d145990f28581731fb7 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb Size/MD5 checksum: 24418 c346db9cb71c6e39328d49318a2f2ed4 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1_all.deb Size/MD5 checksum: 832704 b9e1f325937d5f7596688d5dd848de55 Alpha architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_alpha.deb Size/MD5 checksum: 18104 42337c47e36aab7279b3355987057447 AMD64 architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_amd64.deb Size/MD5 checksum: 14830 1bef3063d2042b93b8734bbf02b57e8f ARM architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 464238 58d912323c90cc0c588d7882965a0171 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 4657690 35d64aacb4e4d9286360881edec6a359 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 1688134 5cc159ac4ba8cd9152513616ebeff876 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 1053572 2ed7da9dfede24ce6c3ac6f3300c9f30 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 7330858 93afcdcfda01d2d08b0bc86f32a3d623 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 3141064 fdd304023a6f6da48c69417b1e531469 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge1_arm.deb Size/MD5 checksum: 3663614 e532db0019cc83e0b40e99cc5bd16179 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_arm.deb Size/MD5 checksum: 16498 98ff86517ac204296c7d2a8bd9d771cb Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_i386.deb Size/MD5 checksum: 14278 b17654c8d53b3813df9eaef78810efd4 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4916 8432a3f7650e77fc8ab88f9bf6efdc2a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4934 83fd412732f3cbc3d8b9c642f968bc61 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4944 91ec4c1ca5123a5552cb1b74bea98b29 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 4962 26f8609ffe3a5711730283a5ac19e206 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_ia64.deb Size/MD5 checksum: 19858 ba4cea60b31ac6926bc2e12c89c98232 HP Precision architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_hppa.deb Size/MD5 checksum: 16894 ef6c734bc7a3be187324d77d6432affd Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2628642 9d7d78cb18b165526d3b9c69274cc186 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2535972 5367f4e405cd97ae879d13149813beca http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2384766 853a2da6b5f179ff9d4bedf82e1a041f http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2468516 788d44179a2aa91c9868c15fb371c11d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2313758 4b7cb73958e218b3f63de0c0e9347e26 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2386394 e0a43e4b96b3ddfb782dd842bf063f89 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge1_m68k.deb Size/MD5 checksum: 2252242 a5f233f48b188fc7889a83c676d64b9e http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_m68k.deb Size/MD5 checksum: 14000 c9efe0c462af304a1ae5a9d3f3ccd2c2 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mips.deb Size/MD5 checksum: 4679334 8c640c4a3323fe874fbf7736afbf592f http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge1.040815-1_mips.deb Size/MD5 checksum: 3846338 af689f1f43f75f242ee3b1ee1d8d5c98 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge1.040815-1_mips.deb Size/MD5 checksum: 3847118 3ee1d8be5f4e2e4c9e4d9e09cb9f31ac http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mips.deb Size/MD5 checksum: 7171242 1ddb30791997030df21a1ca98f4874af http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_mips.deb Size/MD5 checksum: 18054 9174691199f426e382a8876fbb74d0ac Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 4684404 1d8dd72aa68218631bb8c53331bc30f4 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 3030092 dfddac8fdc4fee01d91dcb6a4eb28eea http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 2988820 3f1df983a7cf1691052fe9af1d84b7b1 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 4099956 49da290cf77d5a9a83dd2c365d347900 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 2135184 49d13799447a86acc1462c9d58c0e8e9 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 7035572 b4040a68e042f355c42af12cdc30a587 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 4665112 ce758787e61df3a2f1d4b43dccc68a00 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_mipsel.deb Size/MD5 checksum: 18080 fbb7d48b4b95f67ce8777afa25168ddb PowerPC architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_powerpc.deb Size/MD5 checksum: 16540 fde92bdf463104a5fd110846fbd10d6f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 137990 10c69171982c0953614db790071fe897 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 137824 714f0b2cd873ea876d68d183fab7e59e http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 151838 ab7d3a6c324a2b64eb674148cead1393 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 152182 41e9c9254f399c29b0c198b6d94ca7ac http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 151902 0539b0f041ffbe37a75b71a5554ffd66 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 4681796 c5e92c06e7a9887639da199bc1b94f80 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 4691992 0f2e90800a27bf34f48ea5dc062cbb59 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 4799772 7a4ec03f1373d998539fe68d209589e3 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 2494658 54d0408ab521a0a5e0874c80ebdba402 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 1813568 f6a3da841cffbed57b7bf11119abaf0d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 13474368 134af15cd55b4b3848fdbdeff7ef214d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 12746708 631ef07000bc6f99e43011a63a65c43f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 13779958 5c40bd31a118b3bafda658e258379423 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 65396 a2d652c8bf5b5005597abda9918f02fc http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 8710 4f867433a832c50e2920c4a3c21e4cb2 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb Size/MD5 checksum: 8636 3c83da402850e2e86197a655e26377a2 IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_s390.deb Size/MD5 checksum: 16892 6323a7ca3a316a8eaa412c2a2d9e0e7c http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_sparc.deb Size/MD5 checksum: 15812 85f732679a460ea8bed9a7017dbfc0b8 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@...ts.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDoHjMW5ql+IAeqTIRApozAJ9+r8ias3Sgnoxh07OeZLdnJ2GAogCgogrB R5zgdB2vkdzlUnvQtrzaUz4= =ylfy -----END PGP SIGNATURE-----