[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Debian] Schwachstelle im Debian Linux Kernel (linux-2.6) - DSA-1862-1



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgende Warnung des Debian-Teams. Wir geben
diese Informationen unveraendert an Sie weiter.

CVE-2009-2692 - Null Pointer Referenzierung im Linux Kernel durch
unvollstaendige proto_ops Initialisierung

  Der Linux Kernel initialisiert nicht alle Funktionszeiger in den
  "proto_ops" Datenstrukturen, die bei Aufrufen des socket(2)
  Systemcalls verwendet werden. Infolge dessen kann bei bestimmten
  Operationen die Referenzierung eines NULL Pointers ausgeloest werden.
  Lokale Angreifer koennen diese Schwachstelle dazu ausnutzen,
  beliebigen Code mit den Rechten des Kernels auszufuehren.

  Exploits fuer die Schwachstelle sind frei verfuegbar.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Paket linux in der stable Distribution (lenny) vor Version
  2.6.26-17lenny2 
  Patches fuer die old stable Distribution (etch) werden nachgereicht

  Stable Distribution (lenny)
  Old Stable Distribution (etch)

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

Hersteller Advisory:
  http://www.debian.org/security/2009/dsa-1862


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,
		Klaus Moeller, DFN-CERT

- -- 
Dipl. Inform. Klaus Moeller (Incident Response Team)
Phone: +49 40 808077-555, Fax: +49 40 808077-556

DFN-CERT Services GmbH, https://www.dfn-cert.de,  Phone  +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805,  Ust-IdNr.:  DE 232129737
Sachsenstrase 5, 20097 Hamburg/Germany, CEO: Dr. Klaus-Peter Kossakowski

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ----------------------------------------------------------------------
Debian Security Advisory DSA-1862-1                security@xxxxxxxxxx
http://www.debian.org/security/                           dann frazier
Aug 14, 2009                        http://www.debian.org/security/faq
- - ----------------------------------------------------------------------

Package        : linux-2.6
Vulnerability  : privilege escalation
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2009-2692

A vulnerability has been discovered in the Linux kernel that may lead
to privilege escalation. The Common Vulnerabilities and Exposures project
identifies the following problem:

CVE-2009-2692

    Tavis Ormandy and Julien Tinnes discovered an issue with how the
    sendpage function is initialized in the proto_ops structure.
    Local users can exploit this vulnerability to gain elevated
    privileges.

For the stable distribution (lenny), this problem has been fixed in
version 2.6.26-17lenny2.

For the oldstable distribution (etch), this problem will be fixed in
updates to linux-2.6 and linux-2.6.24.

We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.

Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or "leap-frog" fashion.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:

                                             Debian 5.0 (lenny)
     user-mode-linux                         2.6.26-1um-2+17lenny2

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Stable updates are currently available for alpha, amd64, armel, hppa, i386, ia64, powerpc, and s390.
Updates for arm, mips, mipsel and sparc will be released as they become available.

Source archives:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.dsc
    Size/MD5 checksum:     5777 778d506d29d58629169fb094440a670f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
    Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-17lenny2.diff.gz
    Size/MD5 checksum:  7358563 38994c775f27acf823b0b95bf754db3b

Architecture independent packages:

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-17lenny2_all.deb
    Size/MD5 checksum: 48704700 b9db7b38d2e6b475c589bf0a06adbe12
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-17lenny2_all.deb
    Size/MD5 checksum:  1763974 f11261edc6cdca9cca17867b8780c1a5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-17lenny2_all.deb
    Size/MD5 checksum:   105480 bdcd78ed992cc7ee56e61fd172eab707
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-17lenny2_all.deb
    Size/MD5 checksum:  4626246 b2ccc2b63627a18e639e6ea895bba516
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-17lenny2_all.deb
    Size/MD5 checksum:  2306612 14fc083581d9b30ffdd57416f13463e6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-17lenny2_all.deb
    Size/MD5 checksum:   120812 9c25118292fbc8ca8e0deef89b8ac7ee

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum: 29154078 226201e7b09d11de896b2d315f2e05a1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:   370554 be4db289f1284b9ea320908964031771
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum: 28445388 2d3f4d92ce24404d507e07d4b3c7faed
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:   752348 9abad746737d1a6c73c629d88556631b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:   369148 e506e816e1abd27f0af800949406f379
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:   369540 dcb8a9bc15a83f0ae417cde132b178f3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum: 28464658 0354c7852e965fb2d2a5e3a92e7cc4b6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:   105016 cc2dba5215fc4ec7eafab96f9fdee85a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:   104990 7779df5a92a7c82d8e9805c8478cadd3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_alpha.deb
    Size/MD5 checksum:  3609292 578094d766f9c8715a63f988d546f5db

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum: 21075792 826272290d9a0a7ed9380cb293b74202
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum: 20898512 c144b49aa5303e64c26ffb9a8349299c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   105022 7c5bc39abcd5ea099dc2c68f29c7f61c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:  3936720 98965d3a5a205009bf4176f31a7d5d9d
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   104974 efebe8d0fd9ed2f59b5ae6289baa0c82
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   395090 c1d3d9b5a855cc7d5f73c6822ad33273
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   763150 52377c994b460cd42e87b5199baa93bf
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:  3796042 3506a4904b64dddfde5fd7e96056842a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   104992 ab1255eb1b76a2460a8c82c2bfd3e8cf
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:  3831930 7cdf146e9bed49df55bf1a8ada76ea5e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:  1801802 9bf447bb3b8217ff8374379d8d9e9e8e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:  3853576 1b2e8c45d03a644f0f8e43af99600484
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   394178 38d3f0a7f8839560650c025d6d0c6b25
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum: 20916648 b30ae18c00908ba35838318f33a1a1f4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   391332 e6b8388fc1ad579a393ec8eb83d29c0e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum: 19287240 350f1b3087bae5b9a8869e4da87101b5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-17lenny2_amd64.deb
    Size/MD5 checksum:   399972 04377bd1095a6439a84b9cd54721290f

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum: 11367566 f03bb0e9252092ee464ea5f5fcf928ae
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   104940 4137be5b72ea362ba69c73248fd4fba9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum: 11677718 b937f7e393f11683adf3903075fb607a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   104970 788eff6e57a62d156af1fde94e5f36c2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:  4134282 b0c12f7af6f633058075e00ffcd29c3e
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum: 12390568 ca4548bc381baca564fa3fdae12ce364
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   365084 f2365c4375c0d38d91991dd0e8dd9c40
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:  9566630 7558ef282743dc80d89daa5b987e7341
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   358262 c55651c5078a29296e0b90511d103e88
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   362334 8395b9856cf5bff3d0dd955c719d2f97
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   746046 aeb4565b2c887046e8e8838bb28ada77
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-17lenny2_armel.deb
    Size/MD5 checksum:   333226 e8ea226b74e47c13bafa06904e204f88

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   295810 4c96d67831d9a678f72ba2aa4aa06f99
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   296614 2f5495d3f476641b50dff240686d932a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum: 15611774 ee96399d725a38e58a80dc8b200a5563
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum: 16939988 7b50b257380513da1add191e01694cc3
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   105022 8cee7cda0d9464809e8cdee9e6a7b556
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   104998 3214091598a445c0e7a677b707711153
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:  3591982 a623da1600d191c0a64ae5ec8d27ac39
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   295766 c09c8ec22f461a8a0cdb99cdc2ea27a9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum: 17482396 7c77995f3dbe9c767430aefbc8f59cfb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   297272 b1da5f2b42cff33e40b529e53beca72b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum:   757918 b7d4b035278adaf56e5a230288cfc4f7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-17lenny2_hppa.deb
    Size/MD5 checksum: 16208922 c6a484280f6184e0b442a17ff83e95cd

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20413976 04d51ce56e7028b2f91a3b5fe87286f6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   397326 45be7edbc919158eb59552019016e9fb
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   402268 b385d0f4154014cc64bcfb323383bf44
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   398048 8d5a50e1079929102c3d803131033c1d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   385772 60d654387c6c37a60c8a75b822211442
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20144006 719e7b27a6ea4264f637d9a96c4c5296
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   398742 655d8a3f14fb17b9114bc081042ae648
  http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   104986 9afd8d2bfbc7f6fa263e6ac53dcb2656
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20238528 ce311c203021da955151881cb7d375b2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:  3772394 f6e02fbc6710082f0bf73dfc75910af4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:  3749446 e5d50c30de82e09f8d3b5d99436988ea
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   104998 b03c136b66b63157382dcd7aaef9d717
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   396772 17b48033e6ff6807a9dad27983eb2229
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20083702 0f9da9631140a67c63efd51c9dbc7483
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20767854 5dfaa68464e850bfcc133be3ece0658a
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:  3716762 bcf07113a999521a1f9b037f78ca26f2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   105044 251258ba61dcff1f9109491f568317f0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:  3849260 d73aa1bf73053ba0bb923f548f295c57
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   382932 f530a883d2d83220a711bbb26da436ca
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20262436 d186dc1633c391eac3244d60905f2db7
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   747938 33c87613d7be0a774cda443b63f2960c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:   397028 d16142bc4b5a647260a109a644610858
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 20118938 5639665095f98021e04e1483914ad582
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum:  1590672 f6a77786e8af305b37146f02e49bcc95
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-17lenny2_i386.deb
    Size/MD5 checksum: 17947566 cded55faac16e46093f2dbc615cb8e31

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   353930 468fb9fb898c20a4495da5dddc5a3a10
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum: 34181220 4d819112382d44f42dda16782acc488d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum: 33924346 a457c9a9b75a355004af9b60eb866395
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   105028 d9f0a8520d6d3140b513989b0541aab8
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum: 33991662 b4054df37c0eb3931bccd824a7f67551
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   353338 9c46923df7a43e6685a16d8eeb4b1293
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:  3684826 921ddeb8796289e177964b78a33040f9
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:  3652662 d5a646c88e931cd9c9d5f921c9c61512
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   353962 4289a453c6d503c7037d799cd9b187e0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   746554 b9f732ad3e48eae272d84699ef84eae1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   104998 0616e4dba51187d20b81bb02a66655c2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum: 34101438 d731d8f6e00196bb9def763652095fe2
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-17lenny2_ia64.deb
    Size/MD5 checksum:   353318 eb313d2479e85040db2c8f7a8bc08538

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:  3853594 3428d54581b3f72795f1ab658133ddb0
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum: 23392862 2e62b3795a74736993143b0913ffad15
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum: 23515080 1dd10c4910886222208e97f037832179
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   365636 c3cc1dd7a5ba76e1370d6fac1263c7ec
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:  3888340 48e1e28c6cfb34d0005e42c4364d97c4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   754258 3e2d23d42a85b673ee8c21b8ee87089c
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   371508 c7df98e149454c08bb3439bf0e9eef82
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   364046 3d414da6ab19e93ca08a2b703b81db51
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum: 23113310 f8aade9ca0750376cb5ecf76baf5c727
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   365624 8db3f6054bf35932efdcc20986f51141
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum: 23549948 1fa039fc7e55587037885a22a1e1319f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   371960 490abdbc47f5655f0ba86cdace0bad3b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   105036 cbfbae53d87e834de1b69554f1a65b39
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum:   105000 fa3411e376757a793e420054e01430fd
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-17lenny2_powerpc.deb
    Size/MD5 checksum: 23342334 ae886394987fc9a75a9e27ebd122cb31

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:  3528026 a8d5eb791d93f3f9b73a8243b566f2fc
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:   228388 40091ee787b0f584256489344929511d
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:   229632 54187e8f9a0fd84382204936d0304370
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:   227626 e96920c8bb8f6e355c7553642263b880
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:   739850 c4180ab3de3a95e516a834c45cb8816b
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:   104988 d670e2db78c6cbc665df597d90e66670
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:  3560468 e0495f5c3a10f05392ccf42562ac37e4
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:  7482778 6d560b4726290ecb91222ce93c1945b6
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:  7770286 d33e1e09211445b8eae53cf2b0336bd5
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:  1627186 bec53403751dfb0f4af5d25d19426a8f
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:  7830740 16b4b7cfa849e01bc9db5ee3f6140ea1
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-17lenny2_s390.deb
    Size/MD5 checksum:   105008 e9d1d2283d60611b5a1392fa4f599a59

  These changes will probably be included in the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKhbs/huANDBmkLRkRAtMgAJ9LJwhUB7R04M0T9ACJhSoNTd5AMgCdG8C4
LKJ8ro/vj+cO6KYfvKKWUSI=
=GesL
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFKiXI8k0kIxZMiiQ8RAuS7AKCdL/u+mpn2KH/1uYDSzw1nnfbzVACgj6uC
rVUo56CB110+elHn/2tJMyY=
=cJb5
-----END PGP SIGNATURE-----