From d14a6d5c9c03b27580f4ec7ae9c5e7490f8ebf2b Mon Sep 17 00:00:00 2001 From: dann frazier Date: Fri, 22 Feb 2008 22:13:55 +0000 Subject: rename old dsa text files to include the full version string, otherwise we may get a version clash soon git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1147 e094ebfe-e918-0410-adfb-c712417f3574 --- dsa-texts/2.4.27-10sarge2 | 177 +++++++++++++++++ dsa-texts/2.4.27-10sarge3 | 200 +++++++++++++++++++ dsa-texts/2.4.27-10sarge4 | 125 ++++++++++++ dsa-texts/2.4.27-10sarge5 | 131 +++++++++++++ dsa-texts/2.4.27-sarge2 | 177 ----------------- dsa-texts/2.4.27-sarge3 | 200 ------------------- dsa-texts/2.4.27-sarge4 | 125 ------------ dsa-texts/2.4.27-sarge5 | 131 ------------- dsa-texts/2.6.8-16sarge2 | 251 ++++++++++++++++++++++++ dsa-texts/2.6.8-16sarge3 | 246 ++++++++++++++++++++++++ dsa-texts/2.6.8-16sarge5 | 169 ++++++++++++++++ dsa-texts/2.6.8-16sarge6 | 145 ++++++++++++++ dsa-texts/2.6.8-16sarge7 | 477 ++++++++++++++++++++++++++++++++++++++++++++++ dsa-texts/2.6.8-sarge2 | 251 ------------------------ dsa-texts/2.6.8-sarge3 | 246 ------------------------ dsa-texts/2.6.8-sarge5 | 169 ---------------- dsa-texts/2.6.8-sarge6 | 145 -------------- dsa-texts/2.6.8-sarge7 | 477 ---------------------------------------------- 18 files changed, 1921 insertions(+), 1921 deletions(-) create mode 100644 dsa-texts/2.4.27-10sarge2 create mode 100644 dsa-texts/2.4.27-10sarge3 create mode 100644 dsa-texts/2.4.27-10sarge4 create mode 100644 dsa-texts/2.4.27-10sarge5 delete mode 100644 dsa-texts/2.4.27-sarge2 delete mode 100644 dsa-texts/2.4.27-sarge3 delete mode 100644 dsa-texts/2.4.27-sarge4 delete mode 100644 dsa-texts/2.4.27-sarge5 create mode 100644 dsa-texts/2.6.8-16sarge2 create mode 100644 dsa-texts/2.6.8-16sarge3 create mode 100644 dsa-texts/2.6.8-16sarge5 create mode 100644 dsa-texts/2.6.8-16sarge6 create mode 100644 dsa-texts/2.6.8-16sarge7 delete mode 100644 dsa-texts/2.6.8-sarge2 delete mode 100644 dsa-texts/2.6.8-sarge3 delete mode 100644 dsa-texts/2.6.8-sarge5 delete mode 100644 dsa-texts/2.6.8-sarge6 delete mode 100644 dsa-texts/2.6.8-sarge7 (limited to 'dsa-texts') diff --git a/dsa-texts/2.4.27-10sarge2 b/dsa-texts/2.4.27-10sarge2 new file mode 100644 index 000000000..260f350fd --- /dev/null +++ b/dsa-texts/2.4.27-10sarge2 @@ -0,0 +1,177 @@ +Subject: New Linux kernel 2.4.27 packages fix several issues + +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier, Simon Horman +XXXXX 8th, 2005 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.4.27 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618 +Debian Bug : + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2004-0887 + + Martin Schwidefsky discovered that the privileged instruction SACF (Set + Address Space Control Fast) on the S/390 platform is not handled properly, + allowing for a local user to gain root privileges. + +CVE-2004-1058 + + A race condition allows for a local user to read the environment variables + of another process that is still spawning through /proc/.../cmdline. + +CVE-2004-2607 + + A numeric casting discrepancy in sdla_xfer allows local users to read + portions of kernel memory via a large len argument which is received as an + int but cast to a short, preventing read loop from filling a buffer. + +CVE-2005-0449 + + An error in the skb_checksum_help() function from the netfilter framework + has been discovered that allows the bypass of packet filter rules or + a denial of service attack. + +CVE-2005-1761 + + A vulnerability in the ptrace subsystem of the IA-64 architecture can + allow local attackers to overwrite kernel memory and crash the kernel. + +CVE-2005-2457 + + Tim Yamin discovered that insufficient input validation in the compressed + ISO file system (zisofs) allows a denial of service attack through + maliciously crafted ISO images. + +CVE-2005-2555 + + Herbert Xu discovered that the setsockopt() function was not restricted to + users/processes with the CAP_NET_ADMIN capability. This allows attackers to + manipulate IPSEC policies or initiate a denial of service attack. + +CVE-2005-2709 + + Al Viro discovered a race condition in the /proc handling of network devices. + A (local) attacker could exploit the stale reference after interface shutdown + to cause a denial of service or possibly execute code in kernel mode. + +CVE-2005-2973 + + Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code + can be forced into an endless loop, which allows a denial of service attack. + +CVE-2005-3257 + + Rudolf Polzer discovered that the kernel improperly restricts access to the + KDSKBSENT ioctl, which can possibly lead to privilege escalation. + +CVE-2005-3783 + + The ptrace code using CLONE_THREAD didn't use the thread group ID to + determine whether the caller is attaching to itself, which allows a denial + of service attack. + +CVE-2005-3806 + + Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable, + which could lead to memory corruption and denial of service. + +CVE-2005-3848 + + Ollie Wild discovered a memory leak in the icmp_push_reply() function, which + allows denial of service through memory consumption. + +CVE-2005-3857 + + Chris Wright discovered that excessive allocation of broken file lock leases + in the VFS layer can exhaust memory and fill up the system logging, which allows + denial of service. + +CVE-2005-3858 + + Patrick McHardy discovered a memory leak in the ip6_input_finish() function from + the IPv6 code, which allows denial of service. + +CVE-2005-4618 + + Yi Ying discovered that sysctl does not properly enforce the size of a + buffer, which allows a denial of service attack. + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.4.27-10sarge2 + Alpha architecture 2.4.27-10sarge2 + ARM architecture 2.4.27-2sarge2 + Intel IA-32 architecture 2.4.27-10sarge2 + Intel IA-64 architecture 2.4.27-10sarge2 + Motorola 680x0 architecture 2.4.27-3sarge2 + Big endian MIPS architecture 2.4.27-10.sarge1.040815-2 + Little endian MIPS architecture 2.4.27-10.sarge1.040815-2 + PowerPC architecture 2.4.27-10sarge2 + IBM S/390 architecture 2.4.27-2sarge2 + Sun Sparc architecture 2.4.27-9sarge2 + +The following matrix lists additional packages that were rebuilt for +compatability with or to take advantage of this update: + + Debian 3.1 (sarge) + kernel-latest-2.4-alpha 101sarge1 + kernel-latest-2.4-i386 101sarge1 + kernel-latest-2.4-s390 2.4.27-1sarge1 + kernel-latest-2.4-sparc 42sarge1 + kernel-latest-powerpc 102sarge1 + fai-kernels 1.9.1sarge1 + i2c 1:2.9.1-1sarge1 + kernel-image-speakup-i386 2.4.27-1.1sasrge1 + lm-sensors 1:2.9.1-1sarge3 + mindi-kernel 2.4.27-2sarge1 + pcmcia-modules-2.4.27-i386 3.2.5+2sarge1 + systemimager 3.2.3-6sarge1 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-10sarge3 b/dsa-texts/2.4.27-10sarge3 new file mode 100644 index 000000000..4be83011a --- /dev/null +++ b/dsa-texts/2.4.27-10sarge3 @@ -0,0 +1,200 @@ +Subject: New Linux kernel 2.4.27 packages fix several issues + +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier, Troy Heber +XXXXX 8th, 2005 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.4.27 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742 + CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368 + CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 + CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274 +Debian Bug : + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2006-0038 + + "Solar Designer" discovered that arithmetic computations in netfilter's + do_replace() function can lead to a buffer overflow and the execution of + arbitrary code. However, the operation requires CAP_NET_ADMIN privileges, + which is only an issue in virtualization systems or fine grained access + control systems. + +CVE-2006-0039 + + "Solar Designer" discovered a race condition in netfilter's + do_add_counters() function, which allows information disclosure of + kernel memory by exploiting a race condition. Like CVE-2006-0038, + it requires CAP_NET_ADMIN privileges. + +CVE-2006-0741 + + Intel EM64T systems were discovered to be susceptible to a local + DoS due to an endless recursive fault related to a bad ELF entry + address. + +CVE-2006-0742 + + Alan and Gareth discovered that the ia64 platform had an + incorrectly declared die_if_kernel() function as "does never + return" which could be exploited by a local attacker resulting in + a kernel crash. + +CVE-2006-1056 + + AMD64 machines (and other 7th and 8th generation AuthenticAMD + processors) were found to be vulnerable to sensitive information + leakage, due to how they handle saving and restoring the FOP, FIP, + and FDP x87 registers in FXSAVE/FXRSTOR when an exception is + pending. This allows a process to determine portions of the state + of floating point instructions of other processes. + +CVE-2006-1242 + + Marco Ivaldi discovered that there was an unintended information + disclosure allowing remote attackers to bypass protections against + Idle Scans (nmap -sI) by abusing the ID field of IP packets and + bypassing the zero IP ID in DF packet countermeasure. This was a + result of the ip_push_pending_frames function improperly + incremented the IP ID field when sending a RST after receiving + unsolicited TCP SYN-ACK packets. + +CVE-2006-1343 + + Pavel Kankovsky reported the existance of a potential information leak + resulting from the failure to initialize sin.sin_zero in the IPv4 socket + code. + +CVE-2006-1368 + + Shaun Tancheff discovered a buffer overflow (boundry condition + error) in the USB Gadget RNDIS implementation allowing remote + attackers to cause a DoS. While creating a reply message, the + driver allocated memory for the reply data, but not for the reply + structure. The kernel fails to properly bounds-check user-supplied + data before copying it to an insufficiently sized memory + buffer. Attackers could crash the system, or possibly execute + arbitrary machine code. + +CVE-2006-1524 + + Hugh Dickins discovered an issue in the madvise_remove function wherein + file and mmap restrictions are not followed, allowing local users to + bypass IPC permissions and replace portions of readonly tmpfs files with + zeroes. + +CVE-2006-1525 + + Alexandra Kossovsky reported a NULL pointer dereference condition in + ip_route_input() that can be triggered by a local user by requesting + a route for a multicast IP address, resulting in a denial of service + (panic). + +CVE-2006-1857 + + Vlad Yasevich reported a data validation issue in the SCTP subsystem + that may allow a remote user to overflow a buffer using a badly formatted + HB-ACK chunk, resulting in a denial of service. + +CVE-2006-1858 + + Vlad Yasevich reported a bug in the bounds checking code in the SCTP + subsystem that may allow a remote attacker to trigger a denial of service + attack when rounded parameter lengths are used to calculate parameter + lengths instead of the actual values. + +CVE-2006-1864 + + Mark Mosely discovered that chroots residing on an SMB share can be + escaped with specially crafted "cd" sequences. + +CVE-2006-2271 + + The "Mu security team" discovered that carefully crafted ECNE chunks can + cause a kernel crash by accessing incorrect state stable entries in the + SCTP networking subsystem, which allows denial of service. + +CVE-2006-2272 + + The "Mu security team" discovered that fragmented SCTP control + chunks can trigger kernel panics, which allows for denial of + service attacks. + +CVE-2006-2274 + + It was discovered that SCTP packets with two initial bundled data + packets can lead to infinite recursion, which allows for denial of + service attacks. + + + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.4.27-10sarge3 + Alpha architecture 2.4.27-10sarge3 + ARM architecture 2.4.27-2sarge3 + Intel IA-32 architecture 2.4.27-10sarge3 + Intel IA-64 architecture 2.4.27-10sarge3 + Motorola 680x0 architecture 2.4.27-3sarge3 + Big endian MIPS 2.4.27-10.sarge3.040815-1 + Little endian MIPS 2.4.27-10.sarge3.040815-1 + PowerPC architecture 2.4.27-10sarge3 + IBM S/390 architecture 2.4.27-2sarge3 + Sun Sparc architecture 2.4.27-9sarge3 + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 3.1 (sarge) + fai-kernels 1.9.1sarge2 + kernel-image-2.4.27-speakup 2.4.27-1.1sarge2 + mindi-kernel 2.4.27-2sarge2 + systemimager 3.2.3-6sarge2 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-10sarge4 b/dsa-texts/2.4.27-10sarge4 new file mode 100644 index 000000000..90a8176ed --- /dev/null +++ b/dsa-texts/2.4.27-10sarge4 @@ -0,0 +1,125 @@ +Subject: New Linux kernel 2.4.27 packages fix several issues + +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier +XXXXX 8th, 2005 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.4.27 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2005-4798 CVE-2006-2935 CVE-2006-1528 CVE-2006-2444 + CVE-2006-2446 CVE-2006-3745 CVE-2006-4535 CVE-2006-4145 + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2005-4798 + + Assar discovered a buffer overlow in the NFS readlink handling code + that would allows a malicious remote server to cause a denail of + service (crash) using a long symlink. + +CVE-2006-2935 + + Diego Calleja Garcia discovered a potential buffer overflow in the + dvd_read_bca() function that could allow aribrary code execution via + a malicious CDROM device + +CVE-2006-1528 + + Douglas Gilbert reported a bug in the sg driver that allows local + users to oops the kernel by performing dio transfers from the sg + driver to memory mapped IO space. + +CVE-2006-2444 + + Patrick McHardy reported a memory corruption bug in snmp_trap_decode that + could be used by remote attackers to crash a system. + +CVE-2006-2446 + + A race between the kfree_skb and __skb_unlink functions allows remote + users to crash a system. + +CVE-2006-3745 + + Wei Wang discovered a vulnerability in the SCTP subsystem that can be + exploited for local privilege escalation. + +CVE-2006-4145 + + Colin discovered a bug in the UDF filesystem that allows local users to + hang a system when truncating files. + +CVE-2006-4535 + + David Miller reported a problem with the fix for CVE-2006-3745 that allows + local users to crash the system using via an SCTP socket with a certain + SO_LINGER value. + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.4.27-10sarge4 + Alpha architecture 2.4.27-10sarge4 + ARM architecture 2.4.27-2sarge4 + Intel IA-32 architecture 2.4.27-10sarge4 + Intel IA-64 architecture 2.4.27-10sarge4 + Motorola 680x0 architecture 2.4.27-3sarge4 + Big endian MIPS 2.4.27-10.sarge4.040815-1 + Little endian MIPS 2.4.27-10.sarge4.040815-1 + PowerPC architecture 2.4.27-10sarge4 + IBM S/390 architecture 2.4.27-2sarge4 + Sun Sparc architecture 2.4.27-9sarge4 + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 3.1 (sarge) + fai-kernels 1.9.1sarge4 + kernel-image-2.4.27-speakup 2.4.27-1.1sarge3 + mindi-kernel 2.4.27-2sarge3 + systemimager 3.2.3-6sarge3 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-10sarge5 b/dsa-texts/2.4.27-10sarge5 new file mode 100644 index 000000000..7239e5722 --- /dev/null +++ b/dsa-texts/2.4.27-10sarge5 @@ -0,0 +1,131 @@ +Subject: New Linux kernel 2.4.27 packages fix several issues + +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier +XXXXX 8th, 2005 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.4.27 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2006-4093 CVE-2006-4538 CVE-2006-4997 CVE-2006-5174 + CVE-2006-5649 CVE-2006-5871 + + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2005-4093 + + Olof Johansson reported a local DoS (Denial of Service) vulnerability + on the PPC970 platform. Unpriveleged users can hang the system by + executing the "attn" instruction, which was not being disabled at boot. + +CVE-2006-4538 + + Kirill Korotaev reported a local DoS (Denial of Service) vulnerability + on the ia64 and sparc architectures. A user could cause the system to + crash by executing a malformed ELF binary due to insufficient verification + of the memory layout. + +CVE-2006-4997 + + ADLab Venustech Info Ltd reported a potential remote DoS (Denial of + Service) vulnerability in the IP over ATM subsystem. A remote system + could cause the system to crash by sending specially crafted packets + that would trigger an attempt to free an already-freed pointer + resulting in a system crash. + +CVE-2006-5174 + + Martin Schwidefsky reported a potential leak of sensitive information + on s390 systems. The copy_from_user function did not clear the remaining + bytes of the kernel buffer after receiving a fault on the userspace + address, resulting in a leak of uninitialized kernel memory. A local user + could exploit this by appending to a file from a bad address. + +CVE-2006-5649 + + Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) + vulnerability on powerpc systems. The alignment exception only + checked the exception table for -EFAULT, not for other errors. This can + be exploited by a local user to cause a system crash (panic). + +CVE-2006-5871 + + Bill Allombert reported that various mount options are ignored by smbfs + when UNIX extensions are enabled. This includes the uid, gid and mode + options. Client systems would silently use the server-provided settings + instead of honoring these options, changing the security model. This + update includes a fix from Haroldo Gamal that forces the kernel to honor + these mount options. Note that, since the current versions of smbmount + always pass values for these options to the kernel, it is not currently + possible to activate unix extensions by omitting mount options. However, + this behavior is currently consistent with the current behavior of the + next Debian release, 'etch'. + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.4.27-10sarge5 + Alpha architecture 2.4.27-10sarge5 + ARM architecture 2.4.27-2sarge5 + Intel IA-32 architecture 2.4.27-10sarge5 + Intel IA-64 architecture 2.4.27-10sarge5 + Motorola 680x0 architecture 2.4.27-3sarge5 + Big endian MIPS 2.4.27-10.sarge4.040815-2 + Little endian MIPS 2.4.27-10.sarge4.040815-2 + PowerPC architecture 2.4.27-10sarge5 + IBM S/390 architecture 2.4.27-2sarge5 + Sun Sparc architecture 2.4.27-9sarge5 + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 3.1 (sarge) + fai-kernels 1.9.1sarge5 + kernel-image-2.4.27-speakup 2.4.27-1.1sarge4 + mindi-kernel 2.4.27-2sarge4 + systemimager 3.2.3-6sarge4 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-sarge2 b/dsa-texts/2.4.27-sarge2 deleted file mode 100644 index 260f350fd..000000000 --- a/dsa-texts/2.4.27-sarge2 +++ /dev/null @@ -1,177 +0,0 @@ -Subject: New Linux kernel 2.4.27 packages fix several issues - --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier, Simon Horman -XXXXX 8th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.4.27 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618 -Debian Bug : - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2004-0887 - - Martin Schwidefsky discovered that the privileged instruction SACF (Set - Address Space Control Fast) on the S/390 platform is not handled properly, - allowing for a local user to gain root privileges. - -CVE-2004-1058 - - A race condition allows for a local user to read the environment variables - of another process that is still spawning through /proc/.../cmdline. - -CVE-2004-2607 - - A numeric casting discrepancy in sdla_xfer allows local users to read - portions of kernel memory via a large len argument which is received as an - int but cast to a short, preventing read loop from filling a buffer. - -CVE-2005-0449 - - An error in the skb_checksum_help() function from the netfilter framework - has been discovered that allows the bypass of packet filter rules or - a denial of service attack. - -CVE-2005-1761 - - A vulnerability in the ptrace subsystem of the IA-64 architecture can - allow local attackers to overwrite kernel memory and crash the kernel. - -CVE-2005-2457 - - Tim Yamin discovered that insufficient input validation in the compressed - ISO file system (zisofs) allows a denial of service attack through - maliciously crafted ISO images. - -CVE-2005-2555 - - Herbert Xu discovered that the setsockopt() function was not restricted to - users/processes with the CAP_NET_ADMIN capability. This allows attackers to - manipulate IPSEC policies or initiate a denial of service attack. - -CVE-2005-2709 - - Al Viro discovered a race condition in the /proc handling of network devices. - A (local) attacker could exploit the stale reference after interface shutdown - to cause a denial of service or possibly execute code in kernel mode. - -CVE-2005-2973 - - Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code - can be forced into an endless loop, which allows a denial of service attack. - -CVE-2005-3257 - - Rudolf Polzer discovered that the kernel improperly restricts access to the - KDSKBSENT ioctl, which can possibly lead to privilege escalation. - -CVE-2005-3783 - - The ptrace code using CLONE_THREAD didn't use the thread group ID to - determine whether the caller is attaching to itself, which allows a denial - of service attack. - -CVE-2005-3806 - - Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable, - which could lead to memory corruption and denial of service. - -CVE-2005-3848 - - Ollie Wild discovered a memory leak in the icmp_push_reply() function, which - allows denial of service through memory consumption. - -CVE-2005-3857 - - Chris Wright discovered that excessive allocation of broken file lock leases - in the VFS layer can exhaust memory and fill up the system logging, which allows - denial of service. - -CVE-2005-3858 - - Patrick McHardy discovered a memory leak in the ip6_input_finish() function from - the IPv6 code, which allows denial of service. - -CVE-2005-4618 - - Yi Ying discovered that sysctl does not properly enforce the size of a - buffer, which allows a denial of service attack. - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.4.27-10sarge2 - Alpha architecture 2.4.27-10sarge2 - ARM architecture 2.4.27-2sarge2 - Intel IA-32 architecture 2.4.27-10sarge2 - Intel IA-64 architecture 2.4.27-10sarge2 - Motorola 680x0 architecture 2.4.27-3sarge2 - Big endian MIPS architecture 2.4.27-10.sarge1.040815-2 - Little endian MIPS architecture 2.4.27-10.sarge1.040815-2 - PowerPC architecture 2.4.27-10sarge2 - IBM S/390 architecture 2.4.27-2sarge2 - Sun Sparc architecture 2.4.27-9sarge2 - -The following matrix lists additional packages that were rebuilt for -compatability with or to take advantage of this update: - - Debian 3.1 (sarge) - kernel-latest-2.4-alpha 101sarge1 - kernel-latest-2.4-i386 101sarge1 - kernel-latest-2.4-s390 2.4.27-1sarge1 - kernel-latest-2.4-sparc 42sarge1 - kernel-latest-powerpc 102sarge1 - fai-kernels 1.9.1sarge1 - i2c 1:2.9.1-1sarge1 - kernel-image-speakup-i386 2.4.27-1.1sasrge1 - lm-sensors 1:2.9.1-1sarge3 - mindi-kernel 2.4.27-2sarge1 - pcmcia-modules-2.4.27-i386 3.2.5+2sarge1 - systemimager 3.2.3-6sarge1 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-sarge3 b/dsa-texts/2.4.27-sarge3 deleted file mode 100644 index 4be83011a..000000000 --- a/dsa-texts/2.4.27-sarge3 +++ /dev/null @@ -1,200 +0,0 @@ -Subject: New Linux kernel 2.4.27 packages fix several issues - --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier, Troy Heber -XXXXX 8th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.4.27 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2006-0038 CVE-2006-0039 CVE-2006-0741 CVE-2006-0742 - CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1368 - CVE-2006-1524 CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 - CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274 -Debian Bug : - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2006-0038 - - "Solar Designer" discovered that arithmetic computations in netfilter's - do_replace() function can lead to a buffer overflow and the execution of - arbitrary code. However, the operation requires CAP_NET_ADMIN privileges, - which is only an issue in virtualization systems or fine grained access - control systems. - -CVE-2006-0039 - - "Solar Designer" discovered a race condition in netfilter's - do_add_counters() function, which allows information disclosure of - kernel memory by exploiting a race condition. Like CVE-2006-0038, - it requires CAP_NET_ADMIN privileges. - -CVE-2006-0741 - - Intel EM64T systems were discovered to be susceptible to a local - DoS due to an endless recursive fault related to a bad ELF entry - address. - -CVE-2006-0742 - - Alan and Gareth discovered that the ia64 platform had an - incorrectly declared die_if_kernel() function as "does never - return" which could be exploited by a local attacker resulting in - a kernel crash. - -CVE-2006-1056 - - AMD64 machines (and other 7th and 8th generation AuthenticAMD - processors) were found to be vulnerable to sensitive information - leakage, due to how they handle saving and restoring the FOP, FIP, - and FDP x87 registers in FXSAVE/FXRSTOR when an exception is - pending. This allows a process to determine portions of the state - of floating point instructions of other processes. - -CVE-2006-1242 - - Marco Ivaldi discovered that there was an unintended information - disclosure allowing remote attackers to bypass protections against - Idle Scans (nmap -sI) by abusing the ID field of IP packets and - bypassing the zero IP ID in DF packet countermeasure. This was a - result of the ip_push_pending_frames function improperly - incremented the IP ID field when sending a RST after receiving - unsolicited TCP SYN-ACK packets. - -CVE-2006-1343 - - Pavel Kankovsky reported the existance of a potential information leak - resulting from the failure to initialize sin.sin_zero in the IPv4 socket - code. - -CVE-2006-1368 - - Shaun Tancheff discovered a buffer overflow (boundry condition - error) in the USB Gadget RNDIS implementation allowing remote - attackers to cause a DoS. While creating a reply message, the - driver allocated memory for the reply data, but not for the reply - structure. The kernel fails to properly bounds-check user-supplied - data before copying it to an insufficiently sized memory - buffer. Attackers could crash the system, or possibly execute - arbitrary machine code. - -CVE-2006-1524 - - Hugh Dickins discovered an issue in the madvise_remove function wherein - file and mmap restrictions are not followed, allowing local users to - bypass IPC permissions and replace portions of readonly tmpfs files with - zeroes. - -CVE-2006-1525 - - Alexandra Kossovsky reported a NULL pointer dereference condition in - ip_route_input() that can be triggered by a local user by requesting - a route for a multicast IP address, resulting in a denial of service - (panic). - -CVE-2006-1857 - - Vlad Yasevich reported a data validation issue in the SCTP subsystem - that may allow a remote user to overflow a buffer using a badly formatted - HB-ACK chunk, resulting in a denial of service. - -CVE-2006-1858 - - Vlad Yasevich reported a bug in the bounds checking code in the SCTP - subsystem that may allow a remote attacker to trigger a denial of service - attack when rounded parameter lengths are used to calculate parameter - lengths instead of the actual values. - -CVE-2006-1864 - - Mark Mosely discovered that chroots residing on an SMB share can be - escaped with specially crafted "cd" sequences. - -CVE-2006-2271 - - The "Mu security team" discovered that carefully crafted ECNE chunks can - cause a kernel crash by accessing incorrect state stable entries in the - SCTP networking subsystem, which allows denial of service. - -CVE-2006-2272 - - The "Mu security team" discovered that fragmented SCTP control - chunks can trigger kernel panics, which allows for denial of - service attacks. - -CVE-2006-2274 - - It was discovered that SCTP packets with two initial bundled data - packets can lead to infinite recursion, which allows for denial of - service attacks. - - - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.4.27-10sarge3 - Alpha architecture 2.4.27-10sarge3 - ARM architecture 2.4.27-2sarge3 - Intel IA-32 architecture 2.4.27-10sarge3 - Intel IA-64 architecture 2.4.27-10sarge3 - Motorola 680x0 architecture 2.4.27-3sarge3 - Big endian MIPS 2.4.27-10.sarge3.040815-1 - Little endian MIPS 2.4.27-10.sarge3.040815-1 - PowerPC architecture 2.4.27-10sarge3 - IBM S/390 architecture 2.4.27-2sarge3 - Sun Sparc architecture 2.4.27-9sarge3 - -The following matrix lists additional packages that were rebuilt for -compatibility with or to take advantage of this update: - - Debian 3.1 (sarge) - fai-kernels 1.9.1sarge2 - kernel-image-2.4.27-speakup 2.4.27-1.1sarge2 - mindi-kernel 2.4.27-2sarge2 - systemimager 3.2.3-6sarge2 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-sarge4 b/dsa-texts/2.4.27-sarge4 deleted file mode 100644 index 90a8176ed..000000000 --- a/dsa-texts/2.4.27-sarge4 +++ /dev/null @@ -1,125 +0,0 @@ -Subject: New Linux kernel 2.4.27 packages fix several issues - --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier -XXXXX 8th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.4.27 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2005-4798 CVE-2006-2935 CVE-2006-1528 CVE-2006-2444 - CVE-2006-2446 CVE-2006-3745 CVE-2006-4535 CVE-2006-4145 - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2005-4798 - - Assar discovered a buffer overlow in the NFS readlink handling code - that would allows a malicious remote server to cause a denail of - service (crash) using a long symlink. - -CVE-2006-2935 - - Diego Calleja Garcia discovered a potential buffer overflow in the - dvd_read_bca() function that could allow aribrary code execution via - a malicious CDROM device - -CVE-2006-1528 - - Douglas Gilbert reported a bug in the sg driver that allows local - users to oops the kernel by performing dio transfers from the sg - driver to memory mapped IO space. - -CVE-2006-2444 - - Patrick McHardy reported a memory corruption bug in snmp_trap_decode that - could be used by remote attackers to crash a system. - -CVE-2006-2446 - - A race between the kfree_skb and __skb_unlink functions allows remote - users to crash a system. - -CVE-2006-3745 - - Wei Wang discovered a vulnerability in the SCTP subsystem that can be - exploited for local privilege escalation. - -CVE-2006-4145 - - Colin discovered a bug in the UDF filesystem that allows local users to - hang a system when truncating files. - -CVE-2006-4535 - - David Miller reported a problem with the fix for CVE-2006-3745 that allows - local users to crash the system using via an SCTP socket with a certain - SO_LINGER value. - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.4.27-10sarge4 - Alpha architecture 2.4.27-10sarge4 - ARM architecture 2.4.27-2sarge4 - Intel IA-32 architecture 2.4.27-10sarge4 - Intel IA-64 architecture 2.4.27-10sarge4 - Motorola 680x0 architecture 2.4.27-3sarge4 - Big endian MIPS 2.4.27-10.sarge4.040815-1 - Little endian MIPS 2.4.27-10.sarge4.040815-1 - PowerPC architecture 2.4.27-10sarge4 - IBM S/390 architecture 2.4.27-2sarge4 - Sun Sparc architecture 2.4.27-9sarge4 - -The following matrix lists additional packages that were rebuilt for -compatibility with or to take advantage of this update: - - Debian 3.1 (sarge) - fai-kernels 1.9.1sarge4 - kernel-image-2.4.27-speakup 2.4.27-1.1sarge3 - mindi-kernel 2.4.27-2sarge3 - systemimager 3.2.3-6sarge3 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.4.27-sarge5 b/dsa-texts/2.4.27-sarge5 deleted file mode 100644 index 7239e5722..000000000 --- a/dsa-texts/2.4.27-sarge5 +++ /dev/null @@ -1,131 +0,0 @@ -Subject: New Linux kernel 2.4.27 packages fix several issues - --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier -XXXXX 8th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.4.27 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2006-4093 CVE-2006-4538 CVE-2006-4997 CVE-2006-5174 - CVE-2006-5649 CVE-2006-5871 - - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2005-4093 - - Olof Johansson reported a local DoS (Denial of Service) vulnerability - on the PPC970 platform. Unpriveleged users can hang the system by - executing the "attn" instruction, which was not being disabled at boot. - -CVE-2006-4538 - - Kirill Korotaev reported a local DoS (Denial of Service) vulnerability - on the ia64 and sparc architectures. A user could cause the system to - crash by executing a malformed ELF binary due to insufficient verification - of the memory layout. - -CVE-2006-4997 - - ADLab Venustech Info Ltd reported a potential remote DoS (Denial of - Service) vulnerability in the IP over ATM subsystem. A remote system - could cause the system to crash by sending specially crafted packets - that would trigger an attempt to free an already-freed pointer - resulting in a system crash. - -CVE-2006-5174 - - Martin Schwidefsky reported a potential leak of sensitive information - on s390 systems. The copy_from_user function did not clear the remaining - bytes of the kernel buffer after receiving a fault on the userspace - address, resulting in a leak of uninitialized kernel memory. A local user - could exploit this by appending to a file from a bad address. - -CVE-2006-5649 - - Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) - vulnerability on powerpc systems. The alignment exception only - checked the exception table for -EFAULT, not for other errors. This can - be exploited by a local user to cause a system crash (panic). - -CVE-2006-5871 - - Bill Allombert reported that various mount options are ignored by smbfs - when UNIX extensions are enabled. This includes the uid, gid and mode - options. Client systems would silently use the server-provided settings - instead of honoring these options, changing the security model. This - update includes a fix from Haroldo Gamal that forces the kernel to honor - these mount options. Note that, since the current versions of smbmount - always pass values for these options to the kernel, it is not currently - possible to activate unix extensions by omitting mount options. However, - this behavior is currently consistent with the current behavior of the - next Debian release, 'etch'. - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.4.27-10sarge5 - Alpha architecture 2.4.27-10sarge5 - ARM architecture 2.4.27-2sarge5 - Intel IA-32 architecture 2.4.27-10sarge5 - Intel IA-64 architecture 2.4.27-10sarge5 - Motorola 680x0 architecture 2.4.27-3sarge5 - Big endian MIPS 2.4.27-10.sarge4.040815-2 - Little endian MIPS 2.4.27-10.sarge4.040815-2 - PowerPC architecture 2.4.27-10sarge5 - IBM S/390 architecture 2.4.27-2sarge5 - Sun Sparc architecture 2.4.27-9sarge5 - -The following matrix lists additional packages that were rebuilt for -compatibility with or to take advantage of this update: - - Debian 3.1 (sarge) - fai-kernels 1.9.1sarge5 - kernel-image-2.4.27-speakup 2.4.27-1.1sarge4 - mindi-kernel 2.4.27-2sarge4 - systemimager 3.2.3-6sarge4 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-16sarge2 b/dsa-texts/2.6.8-16sarge2 new file mode 100644 index 000000000..353c3eeef --- /dev/null +++ b/dsa-texts/2.6.8-16sarge2 @@ -0,0 +1,251 @@ +Subject: New Linux kernel 2.6.8 packages fix several issues + +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier, Simon Horman +XXXXX 8th, 2005 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.6.8 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 CVE-2006-1066 +Debian Bug : 295949 334113 330287 332587 332596 330343 330353 327416 + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2004-1017 + + Multiple overflows exist in the io_edgeport driver which might be usable + as a denial of service attack vector. + +CVE-2005-0124 + + Bryan Fulton reported a bounds checking bug in the coda_pioctl function + which may allow local users to execute arbitrary code or trigger a denial + of service attack. + +CVE-2005-0449 + + An error in the skb_checksum_help() function from the netfilter framework + has been discovered that allows the bypass of packet filter rules or + a denial of service attack. + +CVE-2005-2457 + + Tim Yamin discovered that insufficient input validation in the zisofs driver + for compressed ISO file systems allows a denial of service attack through + maliciously crafted ISO images. + +CVE-2005-2490 + + A buffer overflow in the sendmsg() function allows local users to execute + arbitrary code. + +CVE-2005-2555 + + Herbert Xu discovered that the setsockopt() function was not restricted to + users/processes with the CAP_NET_ADMIN capability. This allows attackers to + manipulate IPSEC policies or initiate a denial of service attack. + +CVE-2005-2709 + + Al Viro discovered a race condition in the /proc handling of network devices. + A (local) attacker could exploit the stale reference after interface shutdown + to cause a denial of service or possibly execute code in kernel mode. + +CVE-2005-2800 + + Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices + leak memory, which allows a denial of service attack. + +CVE-2005-2973 + + Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code + can be forced into an endless loop, which allows a denial of service attack. + +CVE-2005-3044 + + Vasiliy Averin discovered that the reference counters from sockfd_put() and + fput() can be forced into overlapping, which allows a denial of service attack + through a null pointer dereference. + +CVE-2005-3053 + + Eric Dumazet discovered that the set_mempolicy() system call accepts a negative + value for it's first argument, which triggers a BUG() assert. This allows a + denial of service attack. + +CVE-2005-3055 + + Harald Welte discovered that if a process issues a USB Request Block (URB) + to a device and terminates before the URB completes, a stale pointer + would be dereferenced. This could be used to trigger a denial of service + attack. + +CVE-2005-3180 + + Pavel Roskin discovered that the driver for Orinoco wireless cards clears + it's buffers insufficiently. This could leak sensitive information into + user space. + +CVE-2005-3181 + + Robert Derr discovered that the audit subsystem uses an incorrect function to + free memory, which allows a denial of service attack. + +CVE-2005-3257 + + Rudolf Polzer discovered that the kernel improperly restricts access to the + KDSKBSENT ioctl, which can possibly lead to privilege escalation. + +CVE-2005-3356 + + Doug Chapman discovered that the mq_open syscall can be tricked into + decrementing an internal counter twice, which allows a denial of service attack + through a kernel panic. + +CVE-2005-3358 + + Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy() + system call leads to a kernel panic, which allows a denial of service attack. + +CVE-2005-3783 + + The ptrace code using CLONE_THREAD didn't use the thread group ID to + determine whether the caller is attaching to itself, which allows a denial + of service attack. + +CVE-2005-3784 + + The auto-reaping of childe processes functionality included ptraced-attached + processes, which allows denial of service through dangling references. + +CVE-2005-3806 + + Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable, + which could lead to memory corruption and denial of service. + +CVE-2005-3847 + + It was discovered that a threaded real-time process, which is currently dumping + core can be forced into a dead-lock situation by sending it a SIGKILL signal, + which allows a denial of service attack. + +CVE-2005-3848 + + Ollie Wild discovered a memory leak in the icmp_push_reply() function, which + allows denial of service through memory consumption. + +CVE-2005-3857 + + Chris Wright discovered that excessive allocation of broken file lock leases + in the VFS layer can exhaust memory and fill up the system logging, which allows + denial of service. + +CVE-2005-3858 + + Patrick McHardy discovered a memory leak in the ip6_input_finish() function from + the IPv6 code, which allows denial of service. + +CVE-2005-4605 + + Karl Janmar discovered that a signedness error in the procfs code can be exploited + to read kernel memory, which may disclose sensitive information. + +CVE-2005-4618 + + Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which + allows a denial of service attack. + +CVE-2006-0095 + + Stefan Rompf discovered that dm_crypt does not clear an internal struct before freeing + it, which might disclose sensitive information. + +CVE-2006-0096 + + It was discovered that the SDLA driver's capability checks were too lax + for firmware upgrades. + +CVE-2006-0482 + + Ludovic Courtes discovered that get_compat_timespec() performs insufficient input + sanitizing, which allows a local denial of service attack. + +CVE-2006-1066 + + It was discovered that ptrace() on the ia64 architecture allows a local denial of + service attack, when preemption is enabled. + + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.6.8-16sarge2 + Alpha architecture 2.6.8-16sarge2 + AMD64 architecture 2.6.8-16sarge2 + HP Precision architecture 2.6.8-6sarge2 + Intel IA-32 architecture 2.6.8-16sarge2 + Intel IA-64 architecture 2.6.8-14sarge2 + Motorola 680x0 architecture 2.6.8-4sarge2 + PowerPC architecture 2.6.8-12sarge2 + IBM S/390 architecture 2.6.8-5sarge2 + Sun Sparc architecture 2.6.8-15sarge2 + +The following matrix lists additional packages that were rebuilt for +compatability with or to take advantage of this update: + + Debian 3.1 (sarge) + kernel-latest-2.6-alpha 101sarge1 + kernel-latest-2.6-amd64 103sarge1 + kernel-latest-2.6-hppa 2.6.8-1sarge1 + kernel-latest-2.6-sparc 101sarge1 + kernel-latest-2.6-i386 101sarge1 + kernel-latest-powerpc 102sarge1 + fai-kernels 1.9.1sarge1 + hostap-modules-i386 0.3.7-1sarge1 + mol-modules-2.6.8 0.9.70+2.6.8+12sarge1 + ndiswrapper-modules-i386 1.1-2sarge1 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-16sarge3 b/dsa-texts/2.6.8-16sarge3 new file mode 100644 index 000000000..2803df248 --- /dev/null +++ b/dsa-texts/2.6.8-16sarge3 @@ -0,0 +1,246 @@ +Subject: New Linux kernel 2.6.8 packages fix several issues + +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier, Troy Heber +XXXXX 8th, 2005 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.6.8 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2005-3359 CVE-2006-0038 CVE-2006-0039 CVE-2006-0456 + CVE-2006-0554 CVE-2006-0555 CVE-2006-0557 CVE-2006-0558 + CVE-2006-0741 CVE-2006-0742 CVE-2006-0744 CVE-2006-1056 + CVE-2006-1242 CVE-2006-1368 CVE-2006-1523 CVE-2006-1524 + CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 CVE-2006-1863 + CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274 +Debian Bug : + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2005-3359 + + Franz Filz discovered that some socket calls permit causing inconsistent + reference counts on loadable modules, which allows local users to cause + a denial of service. + +CVE-2006-0038 + + "Solar Designer" discovered that arithmetic computations in netfilter's + do_replace() function can lead to a buffer overflow and the execution of + arbitrary code. However, the operation requires CAP_NET_ADMIN privileges, + which is only an issue in virtualization systems or fine grained access + control systems. + +CVE-2006-0039 + + "Solar Designer" discovered a race condition in netfilter's + do_add_counters() function, which allows information disclosure of kernel + memory by exploiting a race condition. Likewise, it requires CAP_NET_ADMIN + privileges. + +CVE-2006-0456 + + David Howells discovered that the s390 assembly version of the + strnlen_user() function incorrectly returns some string size values. + +CVE-2006-0554 + + It was discovered that the ftruncate() function of XFS can expose + unallocated, which allows information disclosure of previously deleted + files. + +CVE-2006-0555 + + It was discovered that some NFS file operations on handles mounted with + O_DIRECT can force the kernel into a crash. + +CVE-2006-0557 + + It was discovered that the code to configure memory policies allows + tricking the kernel into a crash, thus allowing denial of service. + +CVE-2006-0558 + + It was discovered by Cliff Wickman that perfmon for the IA64 + architecture allows users to trigger a BUG() assert, which allows + denial of service. + +CVE-2006-0741 + + Intel EM64T systems were discovered to be susceptible to a local + DoS due to an endless recursive fault related to a bad elf entry + address. + +CVE-2006-0742 + + Alan and Gareth discovered that the ia64 platform had an + incorrectly declared die_if_kernel() function as "does never + return" which could be exploited by a local attacker resulting in + a kernel crash. + +CVE-2006-0744 + + The Linux kernel did not properly handle uncanonical return + addresses on Intel EM64T CPUs, reporting exceptions in the SYSRET + instead of the next instruction, causing the kernel exception + handler to run on the user stack with the wrong GS. This may result + in a DoS due to a local user changing the frames. + +CVE-2006-1056 + + AMD64 machines (and other 7th and 8th generation AuthenticAMD + processors) were found to be vulnerable to sensitive information + leakage, due to how they handle saving and restoring the FOP, FIP, + and FDP x87 registers in FXSAVE/FXRSTOR when an exception is + pending. This allows a process to determine portions of the state + of floating point instructions of other processes. + +CVE-2006-1242 + + Marco Ivaldi discovered that there was an unintended information + disclosure allowing remote attackers to bypass protections against + Idle Scans (nmap -sI) by abusing the ID field of IP packets and + bypassing the zero IP ID in DF packet countermeasure. This was a + result of the ip_push_pending_frames function improperly + incremented the IP ID field when sending a RST after receiving + unsolicited TCP SYN-ACK packets. + +CVE-2006-1368 + + Shaun Tancheff discovered a buffer overflow (boundry condition + error) in the USB Gadget RNDIS implementation allowing remote + attackers to cause a DoS. While creating a reply message, the + driver allocated memory for the reply data, but not for the reply + structure. The kernel fails to properly bounds-check user-supplied + data before copying it to an insufficiently sized memory + buffer. Attackers could crash the system, or possibly execute + arbitrary machine code. + +CVE-2006-1523 + + Oleg Nesterov reported an unsafe BUG_ON call in signal.c which was + introduced by RCU signal handling. The BUG_ON code is protected by + siglock while the code in switch_exit_pids() uses tasklist_lock. It + may be possible for local users to exploit this to initiate a denial + of service attack (DoS). + +CVE-2006-1524 + + Hugh Dickins discovered an issue in the madvise_remove function wherein + file and mmap restrictions are not followed, allowing local users to + bypass IPC permissions and replace portions of readonly tmpfs files with + zeroes. + +CVE-2006-1525 + + Alexandra Kossovsky reported a NULL pointer dereference condition in + ip_route_input() that can be triggered by a local user by requesting + a route for a multicast IP address, resulting in a denial of service + (panic). + +CVE-2006-1857 + + Vlad Yasevich reported a data validation issue in the SCTP subsystem + that may allow a remote user to overflow a buffer using a badly formatted + HB-ACK chunk, resulting in a denial of service. + +CVE-2006-1858 + + Vlad Yasevich reported a bug in the bounds checking code in the SCTP + subsystem that may allow a remote attacker to trigger a denial of service + attack when rounded parameter lengths are used to calculate parameter + lengths instead of the actual values. + +CVE-2006-1863 + + Mark Mosely discovered that chroots residing on an CIFS share can be + escaped with specially crafted "cd" sequences. + +CVE-2006-1864 + + Mark Mosely discovered that chroots residing on an SMB share can be + escaped with specially crafted "cd" sequences. + +CVE-2006-2271 + + The "Mu security team" discovered that carefully crafted ECNE chunks can + cause a kernel crash by accessing incorrect state stable entries in the + SCTP networking subsystem, which allows denial of service. + +CVE-2006-2272 + + The "Mu security team" discovered that fragmented SCTP control + chunks can trigger kernel panics, which allows for denial of + service attacks. + +CVE-2006-2274 + + It was discovered that SCTP packets with two initial bundled data + packets can lead to infinite recursion, which allows for denial of + service attacks. + + + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.6.8-16sarge3 + Alpha architecture 2.6.8-16sarge3 + AMD64 architecture 2.6.8-16sarge3 + HP Precision architecture 2.6.8-6sarge3 + Intel IA-32 architecture 2.6.8-16sarge3 + Intel IA-64 architecture 2.6.8-14sarge3 + Motorola 680x0 architecture 2.6.8-4sarge3 + PowerPC architecture 2.6.8-12sarge3 + IBM S/390 architecture 2.6.8-5sarge3 + Sun Sparc architecture 2.6.8-15sarge3 + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 3.1 (sarge) + fai-kernels 1.9.1sarge2 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-16sarge5 b/dsa-texts/2.6.8-16sarge5 new file mode 100644 index 000000000..6e6c6cbc0 --- /dev/null +++ b/dsa-texts/2.6.8-16sarge5 @@ -0,0 +1,169 @@ +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier +XXXXX 8th, 2006 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.6.8 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2006-3468 CVE-2004-2660 CVE-2005-4798 CVE-2006-2935 + CVE-2006-2936 CVE-2006-1052 CVE-2006-1343 CVE-2006-1528 + CVE-2006-1855 CVE-2006-1856 CVE-2006-2444 CVE-2006-2446 + CVE-2006-3745 CVE-2006-4535 CVE-2006-4093 CVE-2006-4145 + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2006-3468 + + James McKenzie discovered a vulnerability in the NFS subsystem, allowing + remote denial of service if an ext3 filesystem is exported. + +CVE-2004-2660 + + IWAMOTO Toshihiro discovered a direct IO memory leak that a malicious + local user could use to create a local denial of service. + +CVE-2005-4798 + + Assar discovered a buffer overlow in the NFS readlink handling code + that would allows a malicious remote server to cause a denail of + service (crash) using a long symlink. + +CVE-2006-2935 + + Diego Calleja Garcia discovered a potential buffer overflow in the + dvd_read_bca() function that could allow aribrary code execution via + a malicious CDROM device + +CVE-2006-2936 + + Ian Abbott and Guillaume Autran provided a fix for a vulnerability in + the ftdio_sio driver that could allow a local user to initiate a denial + of service attack by writing lots of data to the serial port and + consuming all of system memory. + +CVE-2006-1052 + + Stephen Smalley contributed a fix for a bug in SELinux that allows local + users with ptrace permission to change the tracer SID to the SID of + another process. + +CVE-2006-1343 + + Pavel Kankovsky discovered that sockaddr_in.sin_zero is not zeroed + during certain operations returning IPv4 socket names which allows + potentially sensitive memory to be leaked to userspace. + +CVE-2006-1528 + + Douglas Gilbert reported a bug in the sg driver that allows local + users to oops the kernel by performing dio transfers from the sg + driver to memory mapped IO space. + +CVE-2006-1855 + + Mattia Belletti noticed that certain debugging code left in the + choose_new_parent routine allows local users to cause a denial of + service (panic). + +CVE-2006-1856 + + Kostik Belousov discovered a missing LSM file_permission check in the + readv and writev functions which might allow attackers to bypass intended + access restrictions. + +CVE-2006-2444 + + Patrick McHardy reported a memory corruption bug in snmp_trap_decode that + could be used by remote attackers to crash a system. + +CVE-2006-2446 + + A race between the kfree_skb and __skb_unlink functions allows remote + users to crash a system. + +CVE-2006-3745 + + Wei Wang discovered a vulnerability in the SCTP subsystem that can be + exploited for local privilege escalation. + + +CVE-2006-4535 + + David Miller reported a problem with the fix for CVE-2006-3745 that allows + local users to crash the system using via an SCTP socket with a certain + SO_LINGER value. + +CVE-2006-4093 + + Olof Johansson reported a vulnerability on PPC970 systems that allows + local users to hang a machine related to the HID0 attention enable at + boot time. + +CVE-2006-4145 + + Colin discovered a bug in the UDF filesystem that allows local users to + hang a system when truncating files. + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.6.8-16sarge5 + Alpha architecture 2.6.8-16sarge5 + AMD64 architecture 2.6.8-16sarge5 + HP Precision architecture 2.6.8-6sarge5 + Intel IA-32 architecture 2.6.8-16sarge5 + Intel IA-64 architecture 2.6.8-14sarge5 + Motorola 680x0 architecture 2.6.8-4sarge5 + PowerPC architecture 2.6.8-12sarge5 + IBM S/390 architecture 2.6.8-5sarge5 + Sun Sparc architecture 2.6.8-15sarge5 + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 3.1 (sarge) + fai-kernels 1.9.1sarge4 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-16sarge6 b/dsa-texts/2.6.8-16sarge6 new file mode 100644 index 000000000..a54513c56 --- /dev/null +++ b/dsa-texts/2.6.8-16sarge6 @@ -0,0 +1,145 @@ +-------------------------------------------------------------------------- +Debian Security Advisory DSA XXX-1 security@debian.org +http://www.debian.org/security/ Dann Frazier +XXXXX 8th, 2006 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.6.8 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2006-3741 CVE-2006-4538 CVE-2006-4813 CVE-2006-4997 + CVE-2006-5174 CVE-2006-5619 CVE-2006-5649 CVE-2006-5751 + CVE-2006-5871 + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2006-3741 + + Stephane Eranian discovered a local DoS (Denial of Service) vulnerability + on the ia64 architecture. A local user could exhaust the available file + descriptors by exploiting a counting error in the permonctl() system call. + +CVE-2006-4538 + + Kirill Korotaev reported a local DoS (Denial of Service) vulnerability + on the ia64 and sparc architectures. A user could cause the system to + crash by executing a malformed ELF binary due to insufficient verification + of the memory layout. + +CVE-2006-4813 + + Dmitriy Monakhov reported a potential memory leak in the + __block_prepare_write function. __block_prepare_write does not properly + sanitize kernel buffers during error recovery, which could be exploited + by local users to gain access to sensitive kernel memory. + +CVE-2006-4997 + + ADLab Venustech Info Ltd reported a potential remote DoS (Denial of + Service) vulnerability in the IP over ATM subsystem. A remote system + could cause the system to crash by sending specially crafted packets + that would trigger an attempt to free an already-freed pointer + resulting in a system crash. + +CVE-2006-5174 + + Martin Schwidefsky reported a potential leak of sensitive information + on s390 systems. The copy_from_user function did not clear the remaining + bytes of the kernel buffer after receiving a fault on the userspace + address, resulting in a leak of uninitialized kernel memory. A local user + could exploit this by appending to a file from a bad address. + +CVE-2006-5619 + + James Morris reported a potential local DoS (Denial of Service) + vulnerability that could be used to hang or oops a system. The seqfile + handling for /proc/net/ip6_flowlabel has a flaw that can be exploited to + cause an infinite loop by reading this file after creating a flowlabel. + +CVE-2006-5649 + + Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) + vulnerability on powerpc systems. The alignment exception only + checked the exception table for -EFAULT, not for other errors. This can + be exploited by a local user to cause a system crash (panic). + +CVE-2006-5751 + + Eugene Teo reported a vulnerability in the get_fdb_entries function that + could potentially be exploited to allow arbitrary code execution with + escalated priveleges. + +CVE-2006-5871 + + Bill Allombert reported that various mount options are ignored by smbfs + when UNIX extensions are enabled. This includes the uid, gid and mode + options. Client systems would silently use the server-provided settings + instead of honoring these options, changing the security model. This + update includes a fix from Haroldo Gamal that forces the kernel to honor + these mount options. Note that, since the current versions of smbmount + always pass values for these options to the kernel, it is not currently + possible to activate unix extensions by omitting mount options. However, + this behavior is currently consistent with the current behavior of the + next Debian release, 'etch'. + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.6.8-16sarge6 + Alpha architecture 2.6.8-16sarge6 + AMD64 architecture 2.6.8-16sarge6 + HP Precision architecture 2.6.8-6sarge6 + Intel IA-32 architecture 2.6.8-16sarge6 + Intel IA-64 architecture 2.6.8-14sarge6 + Motorola 680x0 architecture 2.6.8-4sarge6 + PowerPC architecture 2.6.8-12sarge6 + IBM S/390 architecture 2.6.8-5sarge6 + Sun Sparc architecture 2.6.8-15sarge6 + +The following matrix lists additional packages that were rebuilt for +compatibility with or to take advantage of this update: + + Debian 3.1 (sarge) + fai-kernels 1.9.1sarge5 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-16sarge7 b/dsa-texts/2.6.8-16sarge7 new file mode 100644 index 000000000..41b629542 --- /dev/null +++ b/dsa-texts/2.6.8-16sarge7 @@ -0,0 +1,477 @@ +-------------------------------------------------------------------------- +Debian Security Advisory DSA 1304-1 security@debian.org +http://www.debian.org/security/ Dann Frazier +June 16th, 2007 http://www.debian.org/security/faq +-------------------------------------------------------------------------- + +Package : kernel-source-2.6.8 +Vulnerability : several +Problem-Type : local/remote +Debian-specific: no +CVE ID : CVE-2005-4811 CVE-2006-4814 CVE-2006-4623 CVE-2006-5753 + CVE-2006-5754 CVE-2006-5757 CVE-2006-6053 CVE-2006-6056 + CVE-2006-6060 CVE-2006-6106 CVE-2006-6535 CVE-2007-0958 + CVE-2007-1357 CVE-2007-1592 + +Several local and remote vulnerabilities have been discovered in the Linux +kernel that may lead to a denial of service or the execution of arbitrary +code. + +This update also fixes a regression in the smbfs subsystem which was introduced +in DSA-1233 which caused symlinks to be interpreted as regular files. + +The Common Vulnerabilities and Exposures project identifies the +following problems: + +CVE-2005-4811 + + David Gibson reported an issue in the hugepage code which could permit + a local DoS (system crash) on appropriately configured systems. + +CVE-2006-4814 + + Doug Chapman discovered a potential local DoS (deadlock) in the mincore + function caused by improper lock handling. + +CVE-2006-4623 + + Ang Way Chuang reported a remote DoS (crash) in the dvb driver which + can be triggered by a ULE package with an SNDU length of 0. + +CVE-2006-5753 + + Eric Sandeen provided a fix for a local memory corruption vulnerability + resulting from a misinterpretation of return values when operating on + inodes which have been marked bad. + +CVE-2006-5754 + + Darrick Wong discovered a local DoS (crash) vulnerability resulting from + the incorrect initialization of "nr_pages" in aio_setup_ring(). + +CVE-2006-5757 + + LMH reported a potential local DoS which could be exploited by a malicious + user with the privileges to mount and read a corrupted iso9660 filesystem. + +CVE-2006-6053 + + LMH reported a potential local DoS which could be exploited by a malicious + user with the privileges to mount and read a corrupted ext3 filesystem. + +CVE-2006-6056 + + LMH reported a potential local DoS which could be exploited by a malicious + user with the privileges to mount and read a corrupted hfs filesystem on + systems with SELinux hooks enabled (Debian does not enable SELinux by + default). + +CVE-2006-6060 + + LMH reported a potential local DoS (infinie loop) which could be exploited + by a malicious user with the privileges to mount and read a corrupted NTFS + filesystem. + +CVE-2006-6106 + + Marcel Holtman discovered multiple buffer overflows in the Bluetooth + subsystem which can be used to trigger a remote DoS (crash) and potentially + execute arbitray code. + +CVE-2006-6535 + + Kostantin Khorenko discovered an invalid error path in dev_queue_xmit() + which could be exploited by a local user to cause data corruption. + +CVE-2007-0958 + + Santosh Eraniose reported a vulnerability that allows local users to read + otherwise unreadable files by triggering a core dump while using PT_INTERP. + This is related to CVE-2004-1073. + +CVE-2007-1357 + + Jean Delvare reported a vulnerability in the appletalk subsystem. + Systems with the appletalk module loaded can be triggered to crash + by other systems on the local network via a malformed frame. + +CVE-2007-1592 + + Masayuki Nakagawa discovered that flow labels were inadvertently + being shared between listening sockets and child sockets. This defect + can be exploited by local users to cause a DoS (Oops). + +The following matrix explains which kernel version for which architecture +fix the problems mentioned above: + + Debian 3.1 (sarge) + Source 2.6.8-16sarge7 + Alpha architecture 2.6.8-16sarge7 + AMD64 architecture 2.6.8-16sarge7 + HP Precision architecture 2.6.8-6sarge7 + Intel IA-32 architecture 2.6.8-16sarge7 + Intel IA-64 architecture 2.6.8-14sarge7 + Motorola 680x0 architecture 2.6.8-4sarge7 + PowerPC architecture 2.6.8-12sarge7 + IBM S/390 architecture 2.6.8-5sarge7 + Sun Sparc architecture 2.6.8-15sarge7 + +We recommend that you upgrade your kernel package immediately and reboot +the machine. If you have built a custom kernel from the kernel source +package, you will need to rebuild to take advantage of these fixes. + +Upgrade Instructions +-------------------- + +wget url + will fetch the file for you +dpkg -i file.deb + will install the referenced file. + +If you are using the apt-get package manager, use the line for +sources.list as given below: + +apt-get update + will update the internal database +apt-get upgrade + will install corrected packages + +You may use an automated update by adding the resources from the +footer to the proper configuration. + + +Debian GNU/Linux 3.1 alias sarge +-------------------------------- + + Source archives: + + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge6.dsc + Size/MD5 checksum: 621 5549801d7afb55815fdbdab176ca876e + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge6.tar.gz + Size/MD5 checksum: 30783 ca74ee036a13e209a496d86cfa216a3a + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge2.dsc + Size/MD5 checksum: 1092 5873dba0c647976525db473f74acb9e0 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge2.tar.gz + Size/MD5 checksum: 2310 77fa2acc4981a8139a83ab5ba38b2496 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge7.dsc + Size/MD5 checksum: 812 31724186421d5e75b4d30bc4c5ac4cfe + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge7.tar.gz + Size/MD5 checksum: 41795 5cf6d42b220f46f3dac97d1c04a8f259 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge7.dsc + Size/MD5 checksum: 1103 375e1122fd79645e41edab034be9de0f + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge7.tar.gz + Size/MD5 checksum: 79256 ca9f65f94ea59b6d7edaf6b78de20adb + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge7.dsc + Size/MD5 checksum: 1013 f815fd7077a24a9bc1639e8965ac8436 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge7.tar.gz + Size/MD5 checksum: 70389 9ebd6b53dfe6592d0783727b994c093e + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge7.dsc + Size/MD5 checksum: 1047 77659b43aa4f6e16200a2fc7c965f38d + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge7.tar.gz + Size/MD5 checksum: 93525 8def6bcf41cc21b34233d64a91fd3711 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge7.dsc + Size/MD5 checksum: 1191 672189ecf8912c0c58dc83dee1db8c43 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge7.tar.gz + Size/MD5 checksum: 67022 d9201644c379a6014c0cc604bfb8e0ab + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge7.dsc + Size/MD5 checksum: 874 faf43ca53f82737f123afab17a74f052 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge7.tar.gz + Size/MD5 checksum: 20214 82cb545e2b7abbb013cae38deebf4e08 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge7.dsc + Size/MD5 checksum: 846 64007a13f7e337cbf008bc2c74b52ea1 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge7.tar.gz + Size/MD5 checksum: 15750 201c22a6234947a99c468f2779160b33 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge7.dsc + Size/MD5 checksum: 1036 354dca83df1ed4b6fd9eb056aa868a0e + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge7.tar.gz + Size/MD5 checksum: 29718 2238b6f81d4b7c64e75d21749a2c9c71 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge7.dsc + Size/MD5 checksum: 1071 1bc90c9c9a884ca21de67e47f7f71831 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge7.tar.gz + Size/MD5 checksum: 29824 c5af34b00421bbf54f73210fae7da80a + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge7.dsc + Size/MD5 checksum: 1002 045ef1474c1a353d5aa48dea8c67183b + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge7.diff.gz + Size/MD5 checksum: 1086810 4d9a1726c26fb571d1b10bc94f4ee102 + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz + Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282 + http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge2.dsc + Size/MD5 checksum: 703 adb50819acd30f02a8c22f0397675bb5 + http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge2.tar.gz + Size/MD5 checksum: 4358 469b36e05242fb4ce2adfc0d102fa2aa + + Architecture independent components: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge7_all.deb + Size/MD5 checksum: 13864 651d60ecebfed7a105e0263f6fe5478e + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge7_all.deb + Size/MD5 checksum: 6185220 661002c3ad09bbd5dcab929d531041b2 + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge7_all.deb + Size/MD5 checksum: 1142308 4cbfb30ffaf7e431cf8b162a37c543a3 + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge7_all.deb + Size/MD5 checksum: 34947952 2487a3846e7143fdfca3ad5664028c88 + http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge7_all.deb + Size/MD5 checksum: 37742 9d7013f35ef4f2720147f393efa265a4 + + Alpha architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4_2.6.8-16sarge7_alpha.deb + Size/MD5 checksum: 2762560 84e7e74114738170f4d9f7df9e270b78 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-generic_2.6.8-16sarge7_alpha.deb + Size/MD5 checksum: 234956 23c852ab91eb4a3ac982c9cbe04eff84 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-smp_2.6.8-16sarge7_alpha.deb + Size/MD5 checksum: 229566 aa37cc2ff3b38f45f0e83bed8d177b47 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-generic_2.6.8-16sarge7_alpha.deb + Size/MD5 checksum: 20243562 d927ee8555993b8d6fc77790d3b55711 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-smp_2.6.8-16sarge7_alpha.deb + Size/MD5 checksum: 20097284 206b31b2bd3751fcea2607ee351c9889 + + AMD64 architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 2725500 3f3ab58e8870ab61b9e23c23761a4604 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 228840 d16b8661666cdde1b13b566da719f49e + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 228024 afcb92db3b32fcef246cfdbaebc7c488 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 224084 d726ad34628dce5f56a292726ef77418 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 225808 d284e53c3827339b685be9c0b2c2bfb0 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 222522 97e162f7245121533a0a20fd6e439b1f + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 12574610 c65adc755a40692b1351fa778a7ce25b + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 13273222 e94fdc0178812250ce7beb3cbcb5156d + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 13229476 87dfdba1729330c694e488fc9bef1bd2 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 13077014 02066ed9e51dbd403e4774492a1f1a4c + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_amd64.deb + Size/MD5 checksum: 13058474 9599a93b640a5d5e8da7f23ed7f4ab27 + + HP Precision architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 2803824 0eb5a4184865094e9e835cd6f199b00c + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 214636 3292ec383938984d8131a40f277319a5 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 213972 61f3fc8bb2046797b43a00c2221e1171 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 213562 ee18d9c16cc6331dbb298d9262abbc9e + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 212888 698a340ca8a5e1d1609dc6352b0199ae + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 16039300 662e50ec503587eeb8745cc5744bfcc1 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 16947726 551b44ab6365f48c3728046f9c625406 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 17493200 d463b06fd140bedf5ff92c922b3cff50 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-6sarge7_hppa.deb + Size/MD5 checksum: 18325380 6b79ea34d4e01ee2aea71140b379b380 + + Intel IA-32 architecture: + + http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge6_i386.deb + Size/MD5 checksum: 12007024 966cfd1adb7d4eb8b14eff257ad90576 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 140588 4d3d9c96e4566ea0ae5b8ce33892b9f5 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 153216 ec1de04dfe524ed566c9168317c7f96d + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 156142 d3d7ccde57a411d1e57fd606dac627fb + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 160348 3f0273700f3be9fa5430046ba227dd91 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 149216 69c40d1ebb04a5ceca0374d28ff6faa2 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 154834 49bca7c096574c6c0dbfe44db03c2cd0 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 158768 d31bb7bcec9ea2d123df2d9d2fc3ccff + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-386_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 147778 16e794df6938137a2bd066f4765c5cb2 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 165352 c92a69dee0c20259819ff4a6e1ce127f + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686-smp_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 169670 fa480aa39abd471188776c526fd168fc + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 163782 ae0f354c82688de2119cd9ade09e74c7 + http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7-smp_0.3.7-1sarge2_i386.deb + Size/MD5 checksum: 168098 bf6e5340a8f9c1484ee5ec72def36707 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 2782142 060404a3576c79845753ca1d7fd32a20 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-386_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 260950 875fa8dd31aa4ec2cd60789028b8998a + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 259062 0aec026194b11813344b17bfcce1f891 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 256060 8bb21af70c57b6dce4f6e21e1681e1f9 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 259116 d894737b2d3bd873362fe8df8ec413b2 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 256212 7bbbee51dae99f8a71d85284311bef37 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-386_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 14068328 6086f827005699f3ce18e8e38a4e6fff + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 15553736 91c0c8cf6f38ff8b13c33ff8eb76914f + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 15391134 41f0635a9278030173cb9a949111e14e + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 15275512 9e089adef128031a8f2115243ee03bd2 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 15168590 2d54f3727c4d608a21400408b2c9d493 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 2725464 90eeb0a9f5709f84c3c938616b1fccb5 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 228766 ffbb8044767a4e03782e14941b72f96d + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 227862 5a0d244abec1d92b8405c2d55f8d8ccc + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 224060 bbd653fcc567ce1c4c39af98e4e14f5c + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 225776 52376bf8dc98cbd4729ca25461efb079 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 222518 39139014fc8b44bbc87db457a49ac084 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 12574442 d17f627e1d88d8bb3c57d10b108ce4d0 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 13273306 fd8193f685bc9ea4f76b39f00bba8f50 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 13229824 5989357674d3f4e12bc2fc89a86ba549 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 13226862 dc2ebac9133fcd8c1b85fb539d779683 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_i386.deb + Size/MD5 checksum: 13205066 6daa6858e61b1843e038f9e2a04df41c + + + Intel IA-64 architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9496 bd1b20781c0a0261864cb25bfd65d9a4 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9560 7e3ff1e6eee69c81f42dd9912dce7baf + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9526 4d29c68fcde4f1164f310a8071783953 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9586 4b0c7ca8651f9c785eccce8b356f766b + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 3101574 b38d525273063519f869b8025e586bf5 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 203348 25239d213c84ee50c68884e6285a95c4 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 202850 8dc59012398a37e508bb33ed5088addd + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 202972 4370ad87aa8f711509fec39878608621 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 202650 804b0b5408cf7d67187f620bf7c0c6c1 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9486 f2391dc971232c3c8a8ab0de5b551fe6 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9556 3cae8e8cdf69ec485d731937ff6f0c30 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9516 1febb236a0987f6a4be151e3923a7ed5 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 9582 275b6170b6857bd1af929448dc54436c + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 21496480 8ba69f1e15994cfe843718d7b46e069f + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 22145752 8ac7fa1bf92bf1c4c0205c182e70c0e9 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 21409290 211383f4405c60f9dcd6f4abd63a863a + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley-smp_2.6.8-14sarge7_ia64.deb + Size/MD5 checksum: 22161834 89aa6c21852a1dd897de9ee9c6686d31 + + Motorola 680x0 architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 3308982 e5231d0f463e8cfad8a2b0affc640639 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 3106740 4cb685cf5ba010c1af6c345b72bf9a09 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 3019810 daedbf476546953537e8b2fd0947bac4 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 2991960 7f83fcf87edd48606c27e6e539c5e8ab + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 3180758 479afd4614662b56a7f877a16c5733a8 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 2984108 246b0da97b814115941b6b367a5a6d69 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 3052328 2a85ffeca76f8a87c09aab9da0365b35 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 3113210 f6f561b65d33a58a0b4a2ba3b5d4eb37 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge7_m68k.deb + Size/MD5 checksum: 2998472 665ea6e94f3e3215bdddde333a8e9109 + + PowerPC architecture: + + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 409476 5e7a4e3b2ed13f34b1e2677a497ee1e9 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3-smp_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 409404 20c20aa48f210bda7407c38b025aa55e + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 409410 f334dac64177c488d67f466ebcf3e169 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4-smp_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 409324 de89552c4f4a5b12c56653cd50fc7f95 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 409688 fcafa2cd922a131165ab0595375426ab + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc-smp_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 409482 034ca72a697bfaaaf3f2594a5403f59c + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-4_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 5150300 70cca6665a0fc4f994c5ce7fda3a59e6 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 13587026 458c7359fbbc76bc02eb8ef2b55cc0b9 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3-smp_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 13948056 a720aaf5f4b6ce53847e96435676842d + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 13579066 36f3e22d4d878a5733272019c5b3f25e + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4-smp_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 13934448 689456442e9921f8f5f724b82c1a4388 + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 13605826 589790a4236615c0b2e7ad508edfbe7c + http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc-smp_2.6.8-12sarge7_powerpc.deb + Size/MD5 checksum: 13864916 50a87b0529f598e4d4684ee6221e3cef + http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-4-powerpc_0.9.70+2.6.8+12sarge2_powerpc.deb + Size/MD5 checksum: 38440 5dd90d5f03bfe8457c5c2ecadc9c2d1c + http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-4-powerpc-smp_0.9.70+2.6.8+12sarge2_powerpc.deb + Size/MD5 checksum: 39372 4edd33511d47ff9e6cf971b0e930374e + + IBM S/390 architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-4_2.6.8-5sarge7_s390.deb + Size/MD5 checksum: 5089222 1df72a6dadb3d4c860e7fb98b8059055 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390_2.6.8-5sarge7_s390.deb + Size/MD5 checksum: 2987292 c1defc5cabc10eaaf039513911ef0bb1 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390-tape_2.6.8-5sarge7_s390.deb + Size/MD5 checksum: 1147294 d2b7b3d5780fca7a4c02f26c2d13c0ba + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390x_2.6.8-5sarge7_s390.deb + Size/MD5 checksum: 3194032 d8e5e1f978e0342345190501e22bce49 + + Sun Sparc architecture: + + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-4_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 8128 2c3760c5ad3d06d389c33f5fc4cb0bca + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 2893516 02e8eca22069fc8d5ccaf3fb20ac3c52 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc32_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 113334 ed0eb1de3b97b909c45dffeed89d40fb + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 148128 bafc5bf78fae912f73a38d927a2cbd47 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64-smp_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 148594 2d01718f8cd038942004778a23ce91b4 + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc32_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 4556924 0061d182061c7b821fb208f348ed870f + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 7440258 ce79e30d9a4807a8bf565b9045b47f9c + http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64-smp_2.6.8-15sarge7_sparc.deb + Size/MD5 checksum: 7638478 306f0c1fc183597513943c030c06505a + + These files will probably be moved into the stable distribution on + its next update. + +--------------------------------------------------------------------------------- +For apt-get: deb http://security.debian.org/ stable/updates main +For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main +Mailing list: debian-security-announce@lists.debian.org +Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-sarge2 b/dsa-texts/2.6.8-sarge2 deleted file mode 100644 index 353c3eeef..000000000 --- a/dsa-texts/2.6.8-sarge2 +++ /dev/null @@ -1,251 +0,0 @@ -Subject: New Linux kernel 2.6.8 packages fix several issues - --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier, Simon Horman -XXXXX 8th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.6.8 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 CVE-2006-1066 -Debian Bug : 295949 334113 330287 332587 332596 330343 330353 327416 - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2004-1017 - - Multiple overflows exist in the io_edgeport driver which might be usable - as a denial of service attack vector. - -CVE-2005-0124 - - Bryan Fulton reported a bounds checking bug in the coda_pioctl function - which may allow local users to execute arbitrary code or trigger a denial - of service attack. - -CVE-2005-0449 - - An error in the skb_checksum_help() function from the netfilter framework - has been discovered that allows the bypass of packet filter rules or - a denial of service attack. - -CVE-2005-2457 - - Tim Yamin discovered that insufficient input validation in the zisofs driver - for compressed ISO file systems allows a denial of service attack through - maliciously crafted ISO images. - -CVE-2005-2490 - - A buffer overflow in the sendmsg() function allows local users to execute - arbitrary code. - -CVE-2005-2555 - - Herbert Xu discovered that the setsockopt() function was not restricted to - users/processes with the CAP_NET_ADMIN capability. This allows attackers to - manipulate IPSEC policies or initiate a denial of service attack. - -CVE-2005-2709 - - Al Viro discovered a race condition in the /proc handling of network devices. - A (local) attacker could exploit the stale reference after interface shutdown - to cause a denial of service or possibly execute code in kernel mode. - -CVE-2005-2800 - - Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices - leak memory, which allows a denial of service attack. - -CVE-2005-2973 - - Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code - can be forced into an endless loop, which allows a denial of service attack. - -CVE-2005-3044 - - Vasiliy Averin discovered that the reference counters from sockfd_put() and - fput() can be forced into overlapping, which allows a denial of service attack - through a null pointer dereference. - -CVE-2005-3053 - - Eric Dumazet discovered that the set_mempolicy() system call accepts a negative - value for it's first argument, which triggers a BUG() assert. This allows a - denial of service attack. - -CVE-2005-3055 - - Harald Welte discovered that if a process issues a USB Request Block (URB) - to a device and terminates before the URB completes, a stale pointer - would be dereferenced. This could be used to trigger a denial of service - attack. - -CVE-2005-3180 - - Pavel Roskin discovered that the driver for Orinoco wireless cards clears - it's buffers insufficiently. This could leak sensitive information into - user space. - -CVE-2005-3181 - - Robert Derr discovered that the audit subsystem uses an incorrect function to - free memory, which allows a denial of service attack. - -CVE-2005-3257 - - Rudolf Polzer discovered that the kernel improperly restricts access to the - KDSKBSENT ioctl, which can possibly lead to privilege escalation. - -CVE-2005-3356 - - Doug Chapman discovered that the mq_open syscall can be tricked into - decrementing an internal counter twice, which allows a denial of service attack - through a kernel panic. - -CVE-2005-3358 - - Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy() - system call leads to a kernel panic, which allows a denial of service attack. - -CVE-2005-3783 - - The ptrace code using CLONE_THREAD didn't use the thread group ID to - determine whether the caller is attaching to itself, which allows a denial - of service attack. - -CVE-2005-3784 - - The auto-reaping of childe processes functionality included ptraced-attached - processes, which allows denial of service through dangling references. - -CVE-2005-3806 - - Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable, - which could lead to memory corruption and denial of service. - -CVE-2005-3847 - - It was discovered that a threaded real-time process, which is currently dumping - core can be forced into a dead-lock situation by sending it a SIGKILL signal, - which allows a denial of service attack. - -CVE-2005-3848 - - Ollie Wild discovered a memory leak in the icmp_push_reply() function, which - allows denial of service through memory consumption. - -CVE-2005-3857 - - Chris Wright discovered that excessive allocation of broken file lock leases - in the VFS layer can exhaust memory and fill up the system logging, which allows - denial of service. - -CVE-2005-3858 - - Patrick McHardy discovered a memory leak in the ip6_input_finish() function from - the IPv6 code, which allows denial of service. - -CVE-2005-4605 - - Karl Janmar discovered that a signedness error in the procfs code can be exploited - to read kernel memory, which may disclose sensitive information. - -CVE-2005-4618 - - Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which - allows a denial of service attack. - -CVE-2006-0095 - - Stefan Rompf discovered that dm_crypt does not clear an internal struct before freeing - it, which might disclose sensitive information. - -CVE-2006-0096 - - It was discovered that the SDLA driver's capability checks were too lax - for firmware upgrades. - -CVE-2006-0482 - - Ludovic Courtes discovered that get_compat_timespec() performs insufficient input - sanitizing, which allows a local denial of service attack. - -CVE-2006-1066 - - It was discovered that ptrace() on the ia64 architecture allows a local denial of - service attack, when preemption is enabled. - - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.6.8-16sarge2 - Alpha architecture 2.6.8-16sarge2 - AMD64 architecture 2.6.8-16sarge2 - HP Precision architecture 2.6.8-6sarge2 - Intel IA-32 architecture 2.6.8-16sarge2 - Intel IA-64 architecture 2.6.8-14sarge2 - Motorola 680x0 architecture 2.6.8-4sarge2 - PowerPC architecture 2.6.8-12sarge2 - IBM S/390 architecture 2.6.8-5sarge2 - Sun Sparc architecture 2.6.8-15sarge2 - -The following matrix lists additional packages that were rebuilt for -compatability with or to take advantage of this update: - - Debian 3.1 (sarge) - kernel-latest-2.6-alpha 101sarge1 - kernel-latest-2.6-amd64 103sarge1 - kernel-latest-2.6-hppa 2.6.8-1sarge1 - kernel-latest-2.6-sparc 101sarge1 - kernel-latest-2.6-i386 101sarge1 - kernel-latest-powerpc 102sarge1 - fai-kernels 1.9.1sarge1 - hostap-modules-i386 0.3.7-1sarge1 - mol-modules-2.6.8 0.9.70+2.6.8+12sarge1 - ndiswrapper-modules-i386 1.1-2sarge1 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-sarge3 b/dsa-texts/2.6.8-sarge3 deleted file mode 100644 index 2803df248..000000000 --- a/dsa-texts/2.6.8-sarge3 +++ /dev/null @@ -1,246 +0,0 @@ -Subject: New Linux kernel 2.6.8 packages fix several issues - --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier, Troy Heber -XXXXX 8th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.6.8 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2005-3359 CVE-2006-0038 CVE-2006-0039 CVE-2006-0456 - CVE-2006-0554 CVE-2006-0555 CVE-2006-0557 CVE-2006-0558 - CVE-2006-0741 CVE-2006-0742 CVE-2006-0744 CVE-2006-1056 - CVE-2006-1242 CVE-2006-1368 CVE-2006-1523 CVE-2006-1524 - CVE-2006-1525 CVE-2006-1857 CVE-2006-1858 CVE-2006-1863 - CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274 -Debian Bug : - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2005-3359 - - Franz Filz discovered that some socket calls permit causing inconsistent - reference counts on loadable modules, which allows local users to cause - a denial of service. - -CVE-2006-0038 - - "Solar Designer" discovered that arithmetic computations in netfilter's - do_replace() function can lead to a buffer overflow and the execution of - arbitrary code. However, the operation requires CAP_NET_ADMIN privileges, - which is only an issue in virtualization systems or fine grained access - control systems. - -CVE-2006-0039 - - "Solar Designer" discovered a race condition in netfilter's - do_add_counters() function, which allows information disclosure of kernel - memory by exploiting a race condition. Likewise, it requires CAP_NET_ADMIN - privileges. - -CVE-2006-0456 - - David Howells discovered that the s390 assembly version of the - strnlen_user() function incorrectly returns some string size values. - -CVE-2006-0554 - - It was discovered that the ftruncate() function of XFS can expose - unallocated, which allows information disclosure of previously deleted - files. - -CVE-2006-0555 - - It was discovered that some NFS file operations on handles mounted with - O_DIRECT can force the kernel into a crash. - -CVE-2006-0557 - - It was discovered that the code to configure memory policies allows - tricking the kernel into a crash, thus allowing denial of service. - -CVE-2006-0558 - - It was discovered by Cliff Wickman that perfmon for the IA64 - architecture allows users to trigger a BUG() assert, which allows - denial of service. - -CVE-2006-0741 - - Intel EM64T systems were discovered to be susceptible to a local - DoS due to an endless recursive fault related to a bad elf entry - address. - -CVE-2006-0742 - - Alan and Gareth discovered that the ia64 platform had an - incorrectly declared die_if_kernel() function as "does never - return" which could be exploited by a local attacker resulting in - a kernel crash. - -CVE-2006-0744 - - The Linux kernel did not properly handle uncanonical return - addresses on Intel EM64T CPUs, reporting exceptions in the SYSRET - instead of the next instruction, causing the kernel exception - handler to run on the user stack with the wrong GS. This may result - in a DoS due to a local user changing the frames. - -CVE-2006-1056 - - AMD64 machines (and other 7th and 8th generation AuthenticAMD - processors) were found to be vulnerable to sensitive information - leakage, due to how they handle saving and restoring the FOP, FIP, - and FDP x87 registers in FXSAVE/FXRSTOR when an exception is - pending. This allows a process to determine portions of the state - of floating point instructions of other processes. - -CVE-2006-1242 - - Marco Ivaldi discovered that there was an unintended information - disclosure allowing remote attackers to bypass protections against - Idle Scans (nmap -sI) by abusing the ID field of IP packets and - bypassing the zero IP ID in DF packet countermeasure. This was a - result of the ip_push_pending_frames function improperly - incremented the IP ID field when sending a RST after receiving - unsolicited TCP SYN-ACK packets. - -CVE-2006-1368 - - Shaun Tancheff discovered a buffer overflow (boundry condition - error) in the USB Gadget RNDIS implementation allowing remote - attackers to cause a DoS. While creating a reply message, the - driver allocated memory for the reply data, but not for the reply - structure. The kernel fails to properly bounds-check user-supplied - data before copying it to an insufficiently sized memory - buffer. Attackers could crash the system, or possibly execute - arbitrary machine code. - -CVE-2006-1523 - - Oleg Nesterov reported an unsafe BUG_ON call in signal.c which was - introduced by RCU signal handling. The BUG_ON code is protected by - siglock while the code in switch_exit_pids() uses tasklist_lock. It - may be possible for local users to exploit this to initiate a denial - of service attack (DoS). - -CVE-2006-1524 - - Hugh Dickins discovered an issue in the madvise_remove function wherein - file and mmap restrictions are not followed, allowing local users to - bypass IPC permissions and replace portions of readonly tmpfs files with - zeroes. - -CVE-2006-1525 - - Alexandra Kossovsky reported a NULL pointer dereference condition in - ip_route_input() that can be triggered by a local user by requesting - a route for a multicast IP address, resulting in a denial of service - (panic). - -CVE-2006-1857 - - Vlad Yasevich reported a data validation issue in the SCTP subsystem - that may allow a remote user to overflow a buffer using a badly formatted - HB-ACK chunk, resulting in a denial of service. - -CVE-2006-1858 - - Vlad Yasevich reported a bug in the bounds checking code in the SCTP - subsystem that may allow a remote attacker to trigger a denial of service - attack when rounded parameter lengths are used to calculate parameter - lengths instead of the actual values. - -CVE-2006-1863 - - Mark Mosely discovered that chroots residing on an CIFS share can be - escaped with specially crafted "cd" sequences. - -CVE-2006-1864 - - Mark Mosely discovered that chroots residing on an SMB share can be - escaped with specially crafted "cd" sequences. - -CVE-2006-2271 - - The "Mu security team" discovered that carefully crafted ECNE chunks can - cause a kernel crash by accessing incorrect state stable entries in the - SCTP networking subsystem, which allows denial of service. - -CVE-2006-2272 - - The "Mu security team" discovered that fragmented SCTP control - chunks can trigger kernel panics, which allows for denial of - service attacks. - -CVE-2006-2274 - - It was discovered that SCTP packets with two initial bundled data - packets can lead to infinite recursion, which allows for denial of - service attacks. - - - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.6.8-16sarge3 - Alpha architecture 2.6.8-16sarge3 - AMD64 architecture 2.6.8-16sarge3 - HP Precision architecture 2.6.8-6sarge3 - Intel IA-32 architecture 2.6.8-16sarge3 - Intel IA-64 architecture 2.6.8-14sarge3 - Motorola 680x0 architecture 2.6.8-4sarge3 - PowerPC architecture 2.6.8-12sarge3 - IBM S/390 architecture 2.6.8-5sarge3 - Sun Sparc architecture 2.6.8-15sarge3 - -The following matrix lists additional packages that were rebuilt for -compatibility with or to take advantage of this update: - - Debian 3.1 (sarge) - fai-kernels 1.9.1sarge2 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-sarge5 b/dsa-texts/2.6.8-sarge5 deleted file mode 100644 index 6e6c6cbc0..000000000 --- a/dsa-texts/2.6.8-sarge5 +++ /dev/null @@ -1,169 +0,0 @@ --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier -XXXXX 8th, 2006 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.6.8 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2006-3468 CVE-2004-2660 CVE-2005-4798 CVE-2006-2935 - CVE-2006-2936 CVE-2006-1052 CVE-2006-1343 CVE-2006-1528 - CVE-2006-1855 CVE-2006-1856 CVE-2006-2444 CVE-2006-2446 - CVE-2006-3745 CVE-2006-4535 CVE-2006-4093 CVE-2006-4145 - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2006-3468 - - James McKenzie discovered a vulnerability in the NFS subsystem, allowing - remote denial of service if an ext3 filesystem is exported. - -CVE-2004-2660 - - IWAMOTO Toshihiro discovered a direct IO memory leak that a malicious - local user could use to create a local denial of service. - -CVE-2005-4798 - - Assar discovered a buffer overlow in the NFS readlink handling code - that would allows a malicious remote server to cause a denail of - service (crash) using a long symlink. - -CVE-2006-2935 - - Diego Calleja Garcia discovered a potential buffer overflow in the - dvd_read_bca() function that could allow aribrary code execution via - a malicious CDROM device - -CVE-2006-2936 - - Ian Abbott and Guillaume Autran provided a fix for a vulnerability in - the ftdio_sio driver that could allow a local user to initiate a denial - of service attack by writing lots of data to the serial port and - consuming all of system memory. - -CVE-2006-1052 - - Stephen Smalley contributed a fix for a bug in SELinux that allows local - users with ptrace permission to change the tracer SID to the SID of - another process. - -CVE-2006-1343 - - Pavel Kankovsky discovered that sockaddr_in.sin_zero is not zeroed - during certain operations returning IPv4 socket names which allows - potentially sensitive memory to be leaked to userspace. - -CVE-2006-1528 - - Douglas Gilbert reported a bug in the sg driver that allows local - users to oops the kernel by performing dio transfers from the sg - driver to memory mapped IO space. - -CVE-2006-1855 - - Mattia Belletti noticed that certain debugging code left in the - choose_new_parent routine allows local users to cause a denial of - service (panic). - -CVE-2006-1856 - - Kostik Belousov discovered a missing LSM file_permission check in the - readv and writev functions which might allow attackers to bypass intended - access restrictions. - -CVE-2006-2444 - - Patrick McHardy reported a memory corruption bug in snmp_trap_decode that - could be used by remote attackers to crash a system. - -CVE-2006-2446 - - A race between the kfree_skb and __skb_unlink functions allows remote - users to crash a system. - -CVE-2006-3745 - - Wei Wang discovered a vulnerability in the SCTP subsystem that can be - exploited for local privilege escalation. - - -CVE-2006-4535 - - David Miller reported a problem with the fix for CVE-2006-3745 that allows - local users to crash the system using via an SCTP socket with a certain - SO_LINGER value. - -CVE-2006-4093 - - Olof Johansson reported a vulnerability on PPC970 systems that allows - local users to hang a machine related to the HID0 attention enable at - boot time. - -CVE-2006-4145 - - Colin discovered a bug in the UDF filesystem that allows local users to - hang a system when truncating files. - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.6.8-16sarge5 - Alpha architecture 2.6.8-16sarge5 - AMD64 architecture 2.6.8-16sarge5 - HP Precision architecture 2.6.8-6sarge5 - Intel IA-32 architecture 2.6.8-16sarge5 - Intel IA-64 architecture 2.6.8-14sarge5 - Motorola 680x0 architecture 2.6.8-4sarge5 - PowerPC architecture 2.6.8-12sarge5 - IBM S/390 architecture 2.6.8-5sarge5 - Sun Sparc architecture 2.6.8-15sarge5 - -The following matrix lists additional packages that were rebuilt for -compatibility with or to take advantage of this update: - - Debian 3.1 (sarge) - fai-kernels 1.9.1sarge4 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-sarge6 b/dsa-texts/2.6.8-sarge6 deleted file mode 100644 index a54513c56..000000000 --- a/dsa-texts/2.6.8-sarge6 +++ /dev/null @@ -1,145 +0,0 @@ --------------------------------------------------------------------------- -Debian Security Advisory DSA XXX-1 security@debian.org -http://www.debian.org/security/ Dann Frazier -XXXXX 8th, 2006 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.6.8 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2006-3741 CVE-2006-4538 CVE-2006-4813 CVE-2006-4997 - CVE-2006-5174 CVE-2006-5619 CVE-2006-5649 CVE-2006-5751 - CVE-2006-5871 - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2006-3741 - - Stephane Eranian discovered a local DoS (Denial of Service) vulnerability - on the ia64 architecture. A local user could exhaust the available file - descriptors by exploiting a counting error in the permonctl() system call. - -CVE-2006-4538 - - Kirill Korotaev reported a local DoS (Denial of Service) vulnerability - on the ia64 and sparc architectures. A user could cause the system to - crash by executing a malformed ELF binary due to insufficient verification - of the memory layout. - -CVE-2006-4813 - - Dmitriy Monakhov reported a potential memory leak in the - __block_prepare_write function. __block_prepare_write does not properly - sanitize kernel buffers during error recovery, which could be exploited - by local users to gain access to sensitive kernel memory. - -CVE-2006-4997 - - ADLab Venustech Info Ltd reported a potential remote DoS (Denial of - Service) vulnerability in the IP over ATM subsystem. A remote system - could cause the system to crash by sending specially crafted packets - that would trigger an attempt to free an already-freed pointer - resulting in a system crash. - -CVE-2006-5174 - - Martin Schwidefsky reported a potential leak of sensitive information - on s390 systems. The copy_from_user function did not clear the remaining - bytes of the kernel buffer after receiving a fault on the userspace - address, resulting in a leak of uninitialized kernel memory. A local user - could exploit this by appending to a file from a bad address. - -CVE-2006-5619 - - James Morris reported a potential local DoS (Denial of Service) - vulnerability that could be used to hang or oops a system. The seqfile - handling for /proc/net/ip6_flowlabel has a flaw that can be exploited to - cause an infinite loop by reading this file after creating a flowlabel. - -CVE-2006-5649 - - Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) - vulnerability on powerpc systems. The alignment exception only - checked the exception table for -EFAULT, not for other errors. This can - be exploited by a local user to cause a system crash (panic). - -CVE-2006-5751 - - Eugene Teo reported a vulnerability in the get_fdb_entries function that - could potentially be exploited to allow arbitrary code execution with - escalated priveleges. - -CVE-2006-5871 - - Bill Allombert reported that various mount options are ignored by smbfs - when UNIX extensions are enabled. This includes the uid, gid and mode - options. Client systems would silently use the server-provided settings - instead of honoring these options, changing the security model. This - update includes a fix from Haroldo Gamal that forces the kernel to honor - these mount options. Note that, since the current versions of smbmount - always pass values for these options to the kernel, it is not currently - possible to activate unix extensions by omitting mount options. However, - this behavior is currently consistent with the current behavior of the - next Debian release, 'etch'. - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.6.8-16sarge6 - Alpha architecture 2.6.8-16sarge6 - AMD64 architecture 2.6.8-16sarge6 - HP Precision architecture 2.6.8-6sarge6 - Intel IA-32 architecture 2.6.8-16sarge6 - Intel IA-64 architecture 2.6.8-14sarge6 - Motorola 680x0 architecture 2.6.8-4sarge6 - PowerPC architecture 2.6.8-12sarge6 - IBM S/390 architecture 2.6.8-5sarge6 - Sun Sparc architecture 2.6.8-15sarge6 - -The following matrix lists additional packages that were rebuilt for -compatibility with or to take advantage of this update: - - Debian 3.1 (sarge) - fai-kernels 1.9.1sarge5 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ diff --git a/dsa-texts/2.6.8-sarge7 b/dsa-texts/2.6.8-sarge7 deleted file mode 100644 index 41b629542..000000000 --- a/dsa-texts/2.6.8-sarge7 +++ /dev/null @@ -1,477 +0,0 @@ --------------------------------------------------------------------------- -Debian Security Advisory DSA 1304-1 security@debian.org -http://www.debian.org/security/ Dann Frazier -June 16th, 2007 http://www.debian.org/security/faq --------------------------------------------------------------------------- - -Package : kernel-source-2.6.8 -Vulnerability : several -Problem-Type : local/remote -Debian-specific: no -CVE ID : CVE-2005-4811 CVE-2006-4814 CVE-2006-4623 CVE-2006-5753 - CVE-2006-5754 CVE-2006-5757 CVE-2006-6053 CVE-2006-6056 - CVE-2006-6060 CVE-2006-6106 CVE-2006-6535 CVE-2007-0958 - CVE-2007-1357 CVE-2007-1592 - -Several local and remote vulnerabilities have been discovered in the Linux -kernel that may lead to a denial of service or the execution of arbitrary -code. - -This update also fixes a regression in the smbfs subsystem which was introduced -in DSA-1233 which caused symlinks to be interpreted as regular files. - -The Common Vulnerabilities and Exposures project identifies the -following problems: - -CVE-2005-4811 - - David Gibson reported an issue in the hugepage code which could permit - a local DoS (system crash) on appropriately configured systems. - -CVE-2006-4814 - - Doug Chapman discovered a potential local DoS (deadlock) in the mincore - function caused by improper lock handling. - -CVE-2006-4623 - - Ang Way Chuang reported a remote DoS (crash) in the dvb driver which - can be triggered by a ULE package with an SNDU length of 0. - -CVE-2006-5753 - - Eric Sandeen provided a fix for a local memory corruption vulnerability - resulting from a misinterpretation of return values when operating on - inodes which have been marked bad. - -CVE-2006-5754 - - Darrick Wong discovered a local DoS (crash) vulnerability resulting from - the incorrect initialization of "nr_pages" in aio_setup_ring(). - -CVE-2006-5757 - - LMH reported a potential local DoS which could be exploited by a malicious - user with the privileges to mount and read a corrupted iso9660 filesystem. - -CVE-2006-6053 - - LMH reported a potential local DoS which could be exploited by a malicious - user with the privileges to mount and read a corrupted ext3 filesystem. - -CVE-2006-6056 - - LMH reported a potential local DoS which could be exploited by a malicious - user with the privileges to mount and read a corrupted hfs filesystem on - systems with SELinux hooks enabled (Debian does not enable SELinux by - default). - -CVE-2006-6060 - - LMH reported a potential local DoS (infinie loop) which could be exploited - by a malicious user with the privileges to mount and read a corrupted NTFS - filesystem. - -CVE-2006-6106 - - Marcel Holtman discovered multiple buffer overflows in the Bluetooth - subsystem which can be used to trigger a remote DoS (crash) and potentially - execute arbitray code. - -CVE-2006-6535 - - Kostantin Khorenko discovered an invalid error path in dev_queue_xmit() - which could be exploited by a local user to cause data corruption. - -CVE-2007-0958 - - Santosh Eraniose reported a vulnerability that allows local users to read - otherwise unreadable files by triggering a core dump while using PT_INTERP. - This is related to CVE-2004-1073. - -CVE-2007-1357 - - Jean Delvare reported a vulnerability in the appletalk subsystem. - Systems with the appletalk module loaded can be triggered to crash - by other systems on the local network via a malformed frame. - -CVE-2007-1592 - - Masayuki Nakagawa discovered that flow labels were inadvertently - being shared between listening sockets and child sockets. This defect - can be exploited by local users to cause a DoS (Oops). - -The following matrix explains which kernel version for which architecture -fix the problems mentioned above: - - Debian 3.1 (sarge) - Source 2.6.8-16sarge7 - Alpha architecture 2.6.8-16sarge7 - AMD64 architecture 2.6.8-16sarge7 - HP Precision architecture 2.6.8-6sarge7 - Intel IA-32 architecture 2.6.8-16sarge7 - Intel IA-64 architecture 2.6.8-14sarge7 - Motorola 680x0 architecture 2.6.8-4sarge7 - PowerPC architecture 2.6.8-12sarge7 - IBM S/390 architecture 2.6.8-5sarge7 - Sun Sparc architecture 2.6.8-15sarge7 - -We recommend that you upgrade your kernel package immediately and reboot -the machine. If you have built a custom kernel from the kernel source -package, you will need to rebuild to take advantage of these fixes. - -Upgrade Instructions --------------------- - -wget url - will fetch the file for you -dpkg -i file.deb - will install the referenced file. - -If you are using the apt-get package manager, use the line for -sources.list as given below: - -apt-get update - will update the internal database -apt-get upgrade - will install corrected packages - -You may use an automated update by adding the resources from the -footer to the proper configuration. - - -Debian GNU/Linux 3.1 alias sarge --------------------------------- - - Source archives: - - http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge6.dsc - Size/MD5 checksum: 621 5549801d7afb55815fdbdab176ca876e - http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge6.tar.gz - Size/MD5 checksum: 30783 ca74ee036a13e209a496d86cfa216a3a - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge2.dsc - Size/MD5 checksum: 1092 5873dba0c647976525db473f74acb9e0 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge2.tar.gz - Size/MD5 checksum: 2310 77fa2acc4981a8139a83ab5ba38b2496 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge7.dsc - Size/MD5 checksum: 812 31724186421d5e75b4d30bc4c5ac4cfe - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge7.tar.gz - Size/MD5 checksum: 41795 5cf6d42b220f46f3dac97d1c04a8f259 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge7.dsc - Size/MD5 checksum: 1103 375e1122fd79645e41edab034be9de0f - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge7.tar.gz - Size/MD5 checksum: 79256 ca9f65f94ea59b6d7edaf6b78de20adb - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge7.dsc - Size/MD5 checksum: 1013 f815fd7077a24a9bc1639e8965ac8436 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge7.tar.gz - Size/MD5 checksum: 70389 9ebd6b53dfe6592d0783727b994c093e - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge7.dsc - Size/MD5 checksum: 1047 77659b43aa4f6e16200a2fc7c965f38d - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge7.tar.gz - Size/MD5 checksum: 93525 8def6bcf41cc21b34233d64a91fd3711 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge7.dsc - Size/MD5 checksum: 1191 672189ecf8912c0c58dc83dee1db8c43 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge7.tar.gz - Size/MD5 checksum: 67022 d9201644c379a6014c0cc604bfb8e0ab - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge7.dsc - Size/MD5 checksum: 874 faf43ca53f82737f123afab17a74f052 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge7.tar.gz - Size/MD5 checksum: 20214 82cb545e2b7abbb013cae38deebf4e08 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge7.dsc - Size/MD5 checksum: 846 64007a13f7e337cbf008bc2c74b52ea1 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge7.tar.gz - Size/MD5 checksum: 15750 201c22a6234947a99c468f2779160b33 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge7.dsc - Size/MD5 checksum: 1036 354dca83df1ed4b6fd9eb056aa868a0e - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge7.tar.gz - Size/MD5 checksum: 29718 2238b6f81d4b7c64e75d21749a2c9c71 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge7.dsc - Size/MD5 checksum: 1071 1bc90c9c9a884ca21de67e47f7f71831 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge7.tar.gz - Size/MD5 checksum: 29824 c5af34b00421bbf54f73210fae7da80a - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge7.dsc - Size/MD5 checksum: 1002 045ef1474c1a353d5aa48dea8c67183b - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge7.diff.gz - Size/MD5 checksum: 1086810 4d9a1726c26fb571d1b10bc94f4ee102 - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz - Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282 - http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge2.dsc - Size/MD5 checksum: 703 adb50819acd30f02a8c22f0397675bb5 - http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge2.tar.gz - Size/MD5 checksum: 4358 469b36e05242fb4ce2adfc0d102fa2aa - - Architecture independent components: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge7_all.deb - Size/MD5 checksum: 13864 651d60ecebfed7a105e0263f6fe5478e - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge7_all.deb - Size/MD5 checksum: 6185220 661002c3ad09bbd5dcab929d531041b2 - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge7_all.deb - Size/MD5 checksum: 1142308 4cbfb30ffaf7e431cf8b162a37c543a3 - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge7_all.deb - Size/MD5 checksum: 34947952 2487a3846e7143fdfca3ad5664028c88 - http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge7_all.deb - Size/MD5 checksum: 37742 9d7013f35ef4f2720147f393efa265a4 - - Alpha architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4_2.6.8-16sarge7_alpha.deb - Size/MD5 checksum: 2762560 84e7e74114738170f4d9f7df9e270b78 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-generic_2.6.8-16sarge7_alpha.deb - Size/MD5 checksum: 234956 23c852ab91eb4a3ac982c9cbe04eff84 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-smp_2.6.8-16sarge7_alpha.deb - Size/MD5 checksum: 229566 aa37cc2ff3b38f45f0e83bed8d177b47 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-generic_2.6.8-16sarge7_alpha.deb - Size/MD5 checksum: 20243562 d927ee8555993b8d6fc77790d3b55711 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-smp_2.6.8-16sarge7_alpha.deb - Size/MD5 checksum: 20097284 206b31b2bd3751fcea2607ee351c9889 - - AMD64 architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 2725500 3f3ab58e8870ab61b9e23c23761a4604 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 228840 d16b8661666cdde1b13b566da719f49e - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 228024 afcb92db3b32fcef246cfdbaebc7c488 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 224084 d726ad34628dce5f56a292726ef77418 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 225808 d284e53c3827339b685be9c0b2c2bfb0 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 222522 97e162f7245121533a0a20fd6e439b1f - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 12574610 c65adc755a40692b1351fa778a7ce25b - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 13273222 e94fdc0178812250ce7beb3cbcb5156d - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 13229476 87dfdba1729330c694e488fc9bef1bd2 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 13077014 02066ed9e51dbd403e4774492a1f1a4c - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_amd64.deb - Size/MD5 checksum: 13058474 9599a93b640a5d5e8da7f23ed7f4ab27 - - HP Precision architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 2803824 0eb5a4184865094e9e835cd6f199b00c - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 214636 3292ec383938984d8131a40f277319a5 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 213972 61f3fc8bb2046797b43a00c2221e1171 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 213562 ee18d9c16cc6331dbb298d9262abbc9e - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 212888 698a340ca8a5e1d1609dc6352b0199ae - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 16039300 662e50ec503587eeb8745cc5744bfcc1 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 16947726 551b44ab6365f48c3728046f9c625406 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 17493200 d463b06fd140bedf5ff92c922b3cff50 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-6sarge7_hppa.deb - Size/MD5 checksum: 18325380 6b79ea34d4e01ee2aea71140b379b380 - - Intel IA-32 architecture: - - http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge6_i386.deb - Size/MD5 checksum: 12007024 966cfd1adb7d4eb8b14eff257ad90576 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 140588 4d3d9c96e4566ea0ae5b8ce33892b9f5 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 153216 ec1de04dfe524ed566c9168317c7f96d - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 156142 d3d7ccde57a411d1e57fd606dac627fb - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 160348 3f0273700f3be9fa5430046ba227dd91 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 149216 69c40d1ebb04a5ceca0374d28ff6faa2 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 154834 49bca7c096574c6c0dbfe44db03c2cd0 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 158768 d31bb7bcec9ea2d123df2d9d2fc3ccff - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-386_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 147778 16e794df6938137a2bd066f4765c5cb2 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 165352 c92a69dee0c20259819ff4a6e1ce127f - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686-smp_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 169670 fa480aa39abd471188776c526fd168fc - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 163782 ae0f354c82688de2119cd9ade09e74c7 - http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7-smp_0.3.7-1sarge2_i386.deb - Size/MD5 checksum: 168098 bf6e5340a8f9c1484ee5ec72def36707 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 2782142 060404a3576c79845753ca1d7fd32a20 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-386_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 260950 875fa8dd31aa4ec2cd60789028b8998a - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 259062 0aec026194b11813344b17bfcce1f891 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 256060 8bb21af70c57b6dce4f6e21e1681e1f9 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 259116 d894737b2d3bd873362fe8df8ec413b2 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 256212 7bbbee51dae99f8a71d85284311bef37 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-386_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 14068328 6086f827005699f3ce18e8e38a4e6fff - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 15553736 91c0c8cf6f38ff8b13c33ff8eb76914f - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 15391134 41f0635a9278030173cb9a949111e14e - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 15275512 9e089adef128031a8f2115243ee03bd2 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 15168590 2d54f3727c4d608a21400408b2c9d493 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 2725464 90eeb0a9f5709f84c3c938616b1fccb5 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 228766 ffbb8044767a4e03782e14941b72f96d - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 227862 5a0d244abec1d92b8405c2d55f8d8ccc - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 224060 bbd653fcc567ce1c4c39af98e4e14f5c - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 225776 52376bf8dc98cbd4729ca25461efb079 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 222518 39139014fc8b44bbc87db457a49ac084 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 12574442 d17f627e1d88d8bb3c57d10b108ce4d0 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 13273306 fd8193f685bc9ea4f76b39f00bba8f50 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 13229824 5989357674d3f4e12bc2fc89a86ba549 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 13226862 dc2ebac9133fcd8c1b85fb539d779683 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-16sarge7_i386.deb - Size/MD5 checksum: 13205066 6daa6858e61b1843e038f9e2a04df41c - - - Intel IA-64 architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9496 bd1b20781c0a0261864cb25bfd65d9a4 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9560 7e3ff1e6eee69c81f42dd9912dce7baf - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9526 4d29c68fcde4f1164f310a8071783953 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9586 4b0c7ca8651f9c785eccce8b356f766b - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 3101574 b38d525273063519f869b8025e586bf5 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 203348 25239d213c84ee50c68884e6285a95c4 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 202850 8dc59012398a37e508bb33ed5088addd - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 202972 4370ad87aa8f711509fec39878608621 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 202650 804b0b5408cf7d67187f620bf7c0c6c1 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9486 f2391dc971232c3c8a8ab0de5b551fe6 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9556 3cae8e8cdf69ec485d731937ff6f0c30 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9516 1febb236a0987f6a4be151e3923a7ed5 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 9582 275b6170b6857bd1af929448dc54436c - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 21496480 8ba69f1e15994cfe843718d7b46e069f - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 22145752 8ac7fa1bf92bf1c4c0205c182e70c0e9 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 21409290 211383f4405c60f9dcd6f4abd63a863a - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley-smp_2.6.8-14sarge7_ia64.deb - Size/MD5 checksum: 22161834 89aa6c21852a1dd897de9ee9c6686d31 - - Motorola 680x0 architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 3308982 e5231d0f463e8cfad8a2b0affc640639 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 3106740 4cb685cf5ba010c1af6c345b72bf9a09 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 3019810 daedbf476546953537e8b2fd0947bac4 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 2991960 7f83fcf87edd48606c27e6e539c5e8ab - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 3180758 479afd4614662b56a7f877a16c5733a8 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 2984108 246b0da97b814115941b6b367a5a6d69 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 3052328 2a85ffeca76f8a87c09aab9da0365b35 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 3113210 f6f561b65d33a58a0b4a2ba3b5d4eb37 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge7_m68k.deb - Size/MD5 checksum: 2998472 665ea6e94f3e3215bdddde333a8e9109 - - PowerPC architecture: - - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 409476 5e7a4e3b2ed13f34b1e2677a497ee1e9 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3-smp_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 409404 20c20aa48f210bda7407c38b025aa55e - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 409410 f334dac64177c488d67f466ebcf3e169 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4-smp_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 409324 de89552c4f4a5b12c56653cd50fc7f95 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 409688 fcafa2cd922a131165ab0595375426ab - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc-smp_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 409482 034ca72a697bfaaaf3f2594a5403f59c - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-4_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 5150300 70cca6665a0fc4f994c5ce7fda3a59e6 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 13587026 458c7359fbbc76bc02eb8ef2b55cc0b9 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3-smp_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 13948056 a720aaf5f4b6ce53847e96435676842d - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 13579066 36f3e22d4d878a5733272019c5b3f25e - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4-smp_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 13934448 689456442e9921f8f5f724b82c1a4388 - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 13605826 589790a4236615c0b2e7ad508edfbe7c - http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc-smp_2.6.8-12sarge7_powerpc.deb - Size/MD5 checksum: 13864916 50a87b0529f598e4d4684ee6221e3cef - http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-4-powerpc_0.9.70+2.6.8+12sarge2_powerpc.deb - Size/MD5 checksum: 38440 5dd90d5f03bfe8457c5c2ecadc9c2d1c - http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-4-powerpc-smp_0.9.70+2.6.8+12sarge2_powerpc.deb - Size/MD5 checksum: 39372 4edd33511d47ff9e6cf971b0e930374e - - IBM S/390 architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-4_2.6.8-5sarge7_s390.deb - Size/MD5 checksum: 5089222 1df72a6dadb3d4c860e7fb98b8059055 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390_2.6.8-5sarge7_s390.deb - Size/MD5 checksum: 2987292 c1defc5cabc10eaaf039513911ef0bb1 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390-tape_2.6.8-5sarge7_s390.deb - Size/MD5 checksum: 1147294 d2b7b3d5780fca7a4c02f26c2d13c0ba - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390x_2.6.8-5sarge7_s390.deb - Size/MD5 checksum: 3194032 d8e5e1f978e0342345190501e22bce49 - - Sun Sparc architecture: - - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-4_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 8128 2c3760c5ad3d06d389c33f5fc4cb0bca - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 2893516 02e8eca22069fc8d5ccaf3fb20ac3c52 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc32_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 113334 ed0eb1de3b97b909c45dffeed89d40fb - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 148128 bafc5bf78fae912f73a38d927a2cbd47 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64-smp_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 148594 2d01718f8cd038942004778a23ce91b4 - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc32_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 4556924 0061d182061c7b821fb208f348ed870f - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 7440258 ce79e30d9a4807a8bf565b9045b47f9c - http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64-smp_2.6.8-15sarge7_sparc.deb - Size/MD5 checksum: 7638478 306f0c1fc183597513943c030c06505a - - These files will probably be moved into the stable distribution on - its next update. - ---------------------------------------------------------------------------------- -For apt-get: deb http://security.debian.org/ stable/updates main -For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main -Mailing list: debian-security-announce@lists.debian.org -Package info: `apt-cache show ' and http://packages.debian.org/ -- cgit v1.2.3