diff options
author | dann frazier <dannf@debian.org> | 2007-08-15 23:40:45 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2007-08-15 23:40:45 +0000 |
commit | 52e86115684a4d1b0dcae8c6cf347a81e44a700e (patch) | |
tree | 8d293b96b89dbc1366140e528d537167f3b04e99 /dsa-texts/2.6.18.dfsg.1-13etch1 | |
parent | 35e4edb035bcfd2a777ffaa4583a50ec854038d4 (diff) |
initial commit
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@913 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'dsa-texts/2.6.18.dfsg.1-13etch1')
-rw-r--r-- | dsa-texts/2.6.18.dfsg.1-13etch1 | 494 |
1 files changed, 494 insertions, 0 deletions
diff --git a/dsa-texts/2.6.18.dfsg.1-13etch1 b/dsa-texts/2.6.18.dfsg.1-13etch1 new file mode 100644 index 00000000..51c2edb7 --- /dev/null +++ b/dsa-texts/2.6.18.dfsg.1-13etch1 @@ -0,0 +1,494 @@ +-------------------------------------------------------------------------- +Debian Security Advisory DSA 1356-1 security@debian.org +http://www.debian.org/security/ Dann Frazier +August 15th, 2007 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : linux-2.6 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453 CVE-2007-2525 + CVE-2007-2876 CVE-2007-3513 CVE-2007-3642 CVE-2007-3848 + CVE-2007-3851 + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2007-1353 + + Ilja van Sprundel discovered that kernel memory could be leaked via the + Bluetooth setsockopt call due to an uninitialized stack buffer. This + could be used by local attackers to read the contents of sensitive kernel + memory. + +CVE-2007-2172 + + Thomas Graf reported a typo in the DECnet protocol handler that could + be used by a local attacker to overrun an array via crafted packets, + potentially resulting in a Denial of Service (system crash). + A similar issue exists in the IPV4 protocol handler and will be fixed + in a subsequent update. + +CVE-2007-2453 + + A couple of issues with random number generation were discovered. + Slightly less random numbers resulted from hashing a subset of the + available entropy. zero-entropy systems were seeded with the same + inputs at boot time, resulting in repeatable series of random numbers. + +CVE-2007-2525 + + Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused + by releasing a socket before PPPIOCGCHAN is called upon it. This could + be used by a local user to DoS a system by consuming all available memory. + +CVE-2007-2876 + + Vilmos Nebehaj discovered a NULL pointer dereference condition in the + netfilter subsystem. This allows remote systems which communicate using + the SCTP protocol to crash a system by creating a connection with an + unknown chunk type. + +CVE-2007-3513 + + Oliver Neukum reported an issue in the usblcd driver which, by not + limiting the size of write buffers, permits local users with write access + to trigger a DoS by consuming all available memory. + +CVE-2007-3642 + + Zhongling Wen reported an issue in nf_conntrack_h323 where the lack of + range checking may lead to NULL pointer dereferences. Remote attackers + could exploit this to create a DoS condition (system crash). + +CVE-2007-3848 + + Wojciech Purczynski discovered that pdeath_signal was not being reset + properly under certain conditions which may allow local users to gain + privileges by sending arbitrary signals to suid binaries. + +CVE-2007-3851 + + Dave Airlie reported that Intel 965 and above chipsets have relocated + their batch buffer security bits. Local X server users may exploit this + to write user data to arbitrary physical memory addresses. + +These problems have been fixed in the stable distribution in version +2.6.18.dfsg.1-13etch1. + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 4.0 (etch) + fai-kernels 1.17+etch4 + user-mode-linux 2.6.18-1um-2etch3 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 4.0 alias etch +-------------------------------- + + Source archives: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.dsc + Size/MD5 checksum: 5672 ef2648e54c6ea1769b29ba191fc13083 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.diff.gz + Size/MD5 checksum: 5306139 589297d453d15848b5879cf22eed7d40 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz + Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060 + + Architecture independent components: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch1_all.deb + Size/MD5 checksum: 3585938 a94cd1247d3dc98378dd094b3b364044 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch1_all.deb + Size/MD5 checksum: 1081908 36d119bd92dbd35a8f83b191f74daf09 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch1_all.deb + Size/MD5 checksum: 1475708 0373ab2ac016f31d2591eab4de39e4d3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch1_all.deb + Size/MD5 checksum: 41417232 279c0d7b44a451169a118e0a2b0c4eeb + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch1_all.deb + Size/MD5 checksum: 3738202 e4cfce3e67d3a0f6aeb4fe1fb5706372 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch1_all.deb + Size/MD5 checksum: 51094 b22167a8b2ab8d0cfb9eded0d0b8d8a0 + + Alpha architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 3024210 ad1fc21ac8fcb76a0db86d25737c8a83 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 50680 28ad3748b8d76abbb2e896f7ff190240 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 50720 1f106b97c91e07921402b0a2174574c6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 263524 4ce1e83ad733aee9d36b075babc6f908 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 263838 4c9ebe648f73818252ed3de79567219e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 262864 a3d6389b9224fcef726128f3a747a4f8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 3048212 d86c3c8fac6533904b91592016e2afba + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 264300 15606dadab1e1bbb4d9234a8bfb09b5e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 23485186 1978fddd39e8e7ce9ebc88efefd4ebe0 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 23464818 bdfd39761fd0bc68de001efb430895af + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 23838852 e9ae2b4f056d9b47832234d2aa6ec4d7 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb + Size/MD5 checksum: 23528772 4f029181ad02c46f2ae2b34038b629e0 + + AMD64 architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 3164562 5bef24546e02e53d0b866b68e57c8294 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 50644 173c9d06298afe48e609cd08a5420737 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 50668 61e625ce94855d474c0562819ae3b879 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 270036 cd6f518453e0b75e3d4e17bc1fca62a3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 3187796 2958630378a24cb3f16807e04fe17297 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 269650 dbfd4c56547401e7b6a6460f41dd266b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 3330944 996a5cba350ae0c9110f8ca72492bfc2 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 271784 c1841e07342a73c9cf87058cc0ca943b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 3353796 730dd7dd17cb532152463000f16459f0 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 270068 363ff82948e473032eaa4fc37d2b9d6b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 16838550 dee2a96f0c89bc9b59b2febd42dc8bb1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 1647400 8f72b372c132b40f5c828d7d0a94bf62 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 1679728 853224dc22a8fa38c8b4af6534886a77 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 15238676 d62ddc5e61a35e84529262c9101b0e93 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 15256142 8b0667dd7cb043b753ce3a9770058515 + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 50618 0da191c5dcd2406d079f9aab3b4ca0a3 + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb + Size/MD5 checksum: 50632 46cd39c06556d9bc465099cddb3c7f3d + + ARM architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 3346806 bc6581484d2364ccba4bbdb275072ecb + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 50652 976339e33b567d816811d561dc575cc8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 50694 19473ef72c0109f1ce9dc9dfd4f3de3d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 225038 969f487c6c9d50fef7200e0a3ecb5c4b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 226564 c5f03ec763dfb6b27d00f8f90e0ae9da + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 232748 bb9606e416b2aa84c3cc8071ac2350d8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 192126 cd01397be860265e013d55aa574c7347 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 194764 e05a0715a2bf9cbac171217b22314b19 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 7518754 018e9a847ff04f7fc3580f85bfc2abe1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 7869416 e4750e15d602443f08ba02c7e7c2a137 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 8806748 7436ed2118660e9c7f4f4697ac5868c3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 4558510 68d071f5a09c182509bea873aef02105 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb + Size/MD5 checksum: 4981066 6c261104c98cc528d6633f79274ad72a + + HP Precision architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 2964238 f6fd8c5dd6071370f953e496756851cf + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 50642 8aca6d6bffa3b334b71b66332dd125ae + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 50668 7dfc3cbdd0f0763008e0246015fe5c9f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 188488 31502e1f9bdcc0a24d6a7762f6f4cbe8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 189420 e6deaa2c4a398b59a40a732cb9018940 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 189146 133d151b9aa064b61c90c0c9ce20656c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 189834 c7ada740b1647894ceda503d4ee8399b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 10498710 5d3ee84cc71a57eabe1d0647f704ad3c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 10940810 8e1de20ffcc7df26862544af83f78771 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 11344516 a6fe777a6d6296c1d95c81c25931102e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb + Size/MD5 checksum: 11751450 e0c73577059ad7ee24893278e8bb580c + + Intel IA-32 architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 3164474 5581e6b60de382087f4e3cd05a326cd8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 277248 ff8b78d10cb79fc1c9258cd43a408499 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 275932 874d04ecd1f692d9781e2cb47c687ee6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 276286 dbcc90161edc6a46b7a89a10b0fc22ff + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 50640 34b3065eb0fdc3a02576c9ebdd2508d9 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 50700 77d1ae15ad63b7e9675225a6ca7db47c + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 268294 a60191beaaf0d62099dbd1a20eaf6b75 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 275830 f9a83308d8ecd6eb36d6791b864116c5 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 3050892 8283afde8651de38ff35c68ac9d34feb + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 273688 759941012b1848db94e34d6f1c57cfd6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 273764 bc27c920b5a85c643d3f9a7fa3bb2f9f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 3145220 f0cee6bc58f389ef78fc3cbcad757197 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 270550 b1aca209d3f63334b8512bd70e7fee04 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 3167356 72a44aac33deb66d1eed41b37d9f6f84 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 271130 cebd78501825a595f992a575371cd8b7 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16170152 7dbf8514bc38e86a6d6454593628a9a8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16319248 a099f9f04a33385dc29a7cc5ed743411 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16384438 83d05912745de976a2648295241f0b15 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16816198 1c14cd0e4867b12f05bea602a7940b11 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16449650 9c195ec1b9f2b5f2531017389234d817 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16358054 727d0f2e6e821a34c527c44946660653 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 16488812 1619800305c3c55e48f9b5484cd7ec39 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 1296346 6f233c2b69738b9d577a4c1d7d9283a3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 1323270 c3ba3e1299340fe9666746ada15cafe2 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 14258314 37215c1b602209320153136ddae5b53d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 14272088 00cfea4d19109eff959c360f63b90c18 + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 50620 3d60ebbd894ac77ddaafaaba903083b8 + http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb + Size/MD5 checksum: 50636 9277c97ebb5c14fc93c5449c5e5a391c + + Intel IA-64 architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 3078390 7c1dc7cf08fdce40fdb01acd14c6167b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 50644 4303c1255e6d4840b9ce34b8da158125 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 50662 5235fb30a8f35c91ea15335ee439a60d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 251576 5b89eeb214501b0a1b6e2d2712763fe3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 251558 573aa9cc9fba9924a98a1b6ca786edfe + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 28008514 baaf3f87d60cb1d68c361cea849d3c27 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb + Size/MD5 checksum: 28178022 c6cb8de82903383b78c7a9646d7df7da + + Big endian MIPS architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 3346354 c0c5d438a80a114ffbe515104f44785f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 50644 822db9efc5caba5bd3f96c2ffef90ce8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 50692 9fbd9cb53ce75b25243adfb5568bd2f9 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 146348 4a2ede92f7cba5e409a01504a5787786 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 156600 b56c8fe624757cca08eafda9a7b62122 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 160930 14710075883c5cb17ed1f4dfa854461f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 179380 f61160dd2e459a70170e5ba8524aea36 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 179154 aba921bcc75c80c0c96c727eac34afaf + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 6090314 99e9641ce38b6d0530199ad566738d73 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 8271518 6979492cd1b01cf3b76958211bfb3bdf + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 9037182 56824fbbc825d14d2fec62b2562f44ce + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 15636546 85bc62cca019e5d5c07374fe4ea05df8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb + Size/MD5 checksum: 15608670 233369e78b74fdca2143c971995440f5 + + Little endian MIPS architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 3346628 a208480b2fa7bdd13559b4078d03cac9 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 50648 20d1bf2c345a889720562597f9300152 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 50712 31666ed837cac8aec136528616a7407f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 146012 ec774ccba8d1783239b0f12cee90abe3 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 152252 99657c9b655c5f1bded07e4a5394d132 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 152340 0c0778fa59bda664f8cb4f0f1ba8f90b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 174444 8927ed0b8d880d99fcc79c64ecc44c54 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 179284 8b01ba01c4d2e0e4a1dbfd4acd5354ea + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 179144 368da689abd47ca70aced24efec5b040 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 6025698 a355ec38f440f7e08d0f22ce6184bcf8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 5937952 2de36f1fdeb55373eb50fb77efe7f938 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 5921402 006d6d3d34f2db5b21500cdc8914dc08 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 9857018 4246c3b15aae0df84b669381a8f1383e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 15052960 317130eff4221493bf31349bb99d0eab + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb + Size/MD5 checksum: 15019204 a5c6e183ff53d3c8fd169f0d2bc17ebc + + PowerPC architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 3388916 6d6415c4241ea26786fd3a72899e266f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 50652 f19e0ad61b5e91f685e920a58248c8e9 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 50698 111c11da4f26a93122b76b6eac5b92c8 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 248366 7bafbd435e00ad6b647b347d84e1e0c1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 225218 90e19db35ef618a7e3f476576de60d95 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 248400 3dd8373a35220a27423c3f4eadd32358 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 248712 8a0281e9b856372f4d01c8a0f4b02d72 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 242934 92f3fda2938f60fdf6f957f0659712ab + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 3411216 b9070329bf0a6045896db2fc15f66f0a + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 248448 e108e05b4fe2239d4e95fb6598405fd6 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 249006 3908dfaf4f518192bd550ca5ac45476f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 16623606 b76fa67819092073c6bfc51904163278 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 15149270 502237df8e0f90e7ab95b28cbe7a5f8f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 16960668 69f13fe8bde671497363849f76636eda + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 18291108 9cc68d73b1bcf401176d1f93bd1dfeb1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 16395670 fbab6e355aba9c29f63603d097855c5e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 17006732 cca0573ca442e02ad6f153fcc059f734 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb + Size/MD5 checksum: 18340518 3940b166f8b0464baa118c8557922edb + + IBM S/390 architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 2939624 fada85c4d5ec9cbdee803116fde561b1 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 50642 9478b247c93b2ba8b405f93b525307ae + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 50664 d694fdeff900e5b1ba575ad15bbd5310 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 139294 02bcbe57d1b62129243c8cb4b7bb8d2d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 139538 69993d0e2867ed4efa5bb0e442d3d014 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 2962698 36d89e72ac15117d15a3488878d205a4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 140274 5b8bacca256347a7ce02783651110e35 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 5398576 b1054f70f0472fd020241b6af904438d + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 1435060 daf41750946017171aad603b9218d0c4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 5613112 68d67210c4c6aa0ea54b1754df137d8e + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb + Size/MD5 checksum: 5659570 c6a2db3553a427cecf69d9f1258e9444 + + Sun Sparc architecture: + + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 3164578 902a8ff3089225278575251ba13f1f98 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 50640 455bd9863c6f183ee28d15e7ba9ddc38 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 50674 8416d5c20659923183729457854e139f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 161886 f58a554b0de7e05c4727bff1e236a069 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 191010 bad7bf07af89b1ba54ff559f99cf3d1b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 191776 f059b7c75ea312f69758d02e6da4cd4f + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 3186936 2a865cc6aed95cdc0ed3ebb20ec0a6d0 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 192172 197b2cd91975cbda876bc0ac18244870 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 6406184 e0ce977a5c79906c4996f069672e272b + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 10351700 69bc68d296d9134f6df792fb745c9810 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 10610496 b40bc9a07de220a54a1489b22d1d60f4 + http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb + Size/MD5 checksum: 10656362 91c6c66c24c7d5ca45c0e6eb5dcdcbba + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ etch/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/etch/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> |