Debian 10226 Published by

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 922-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
December 14th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : kernel-source-2.6.8
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2004-2302 CVE-2005-0756 CVE-2005-0757 CVE-2005-1265
CVE-2005-1761 CVE-2005-1762 CVE-2005-1763 CVE-2005-1765
CVE-2005-1767 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459
CVE-2005-2548 CVE-2005-2801 CVE-2005-2872 CVE-2005-3105
CVE-2005-3106 CVE-2005-3107 CVE-2005-3108 CVE-2005-3109
CVE-2005-3110 CVE-2005-3271 CVE-2005-3272 CVE-2005-3273
CVE-2005-3274 CVE-2005-3275 CVE-2005-3276
BugTraq IDs : 14477 15527 15528 15533
Debian Bugs : 309308 311164 321401 322237 322339

Several local and remote vulnerabilities have been discovered in the
Linux kernel that may lead to a denial of service or the execution of
arbitrary code. The Common Vulnerabilieis and Exposures project
identifies the following problems:

CVE-2004-2302

A race condition in the sysfs filesystem allows local users to
read kernel memory and cause a denial of service (crash).


CVE-2005-0756

Alexander Nyberg discovered that the ptrace() system call does not
properly verify addresses on the amd64 architecture which can be
exploited by a local attacker to crash the kernel.

CVE-2005-0757

A problem in the offset handling in the xattr file system code for
ext3 has been discovered that may allow users on 64-bit systems
that have access to an ext3 filesystem with extended attributes to
cause the kernel to crash.

CVE-2005-1265

Chris Wright discovered that the mmap() function could create
illegal memory maps that could be exploited by a local user to
crash the kernel or potentially execute arbitrary code.

CVE-2005-1761

A vulnerability on the IA-64 architecture can lead local attackers
to overwrite kernel memory and crash the kernel.

CVE-2005-1762

A vulnerability has been discovered in the ptrace() system call on
the amd64 architecture that allowas a local attacker to cause the
kernel to crash.

CVE-2005-1763

A buffer overflow in the ptrace system call for 64-bit
architectures allows local users to write bytes into arbitrary
kernel memory.

CVE-2005-1765

Zou Nan Hai has discovered that a local user could cause the
kernel to hang on the amd64 architecture after invoking syscall()
with specially crafted arguments.

CVE-2005-1767

A vulnerability has been discovered in the stack segment fault
handler that could allow a local attacker to cause stack exception
that will leed the kernel to crash under certain circumstances.

CVE-2005-2456

Balazs Scheidler discovered that a local attacker could call
setsockopt() with an invalid xfrm_user policy message which would
cause the kernel to write beyond the boundaries of an array and
crash.

CVE-2005-2458

Vladimir Volovich discovered a bug in the zlib routines which are
also present in the Linux kernel and allows remote attackers to
krash the kernel

CVE-2005-2459

Another vulnerability has been discovered in the zlib routines
which are also present in the Linux kernel and allows remote
attackers to crash the kernel

CVE-2005-2548

Peter Sandstrom noticed that snmpwalk from a remote host could
cause a denial of service (kernel oops from null dereference) via
certain UDP packets that lead to a function call with the wrong
argument.

CVE-2005-2801

Andreas Gruenbacher discovered a bug in the ext2 and ext3 file
systems. When data areas are to be shared among two inodes not
all information were compared for equality, which could expose
wrong ACLs for files.

CVE-2005-2872

Chad Walstrom discovered that the ipt_recent kernel module on
64-bit processors such as AMD64 ows remote attackers to cause a
denial of service (kernel panic) via certain attacks such as SSH
brute force.

CVE-2005-3105

The mprotect code on Itanium IA-64 Montecito processors does not
properly maintain cache coherency as required by the architecture,
which allows local users to cause a denial of service and possibly
corrupt data by modifying PTE protections.

CVE-2005-3106

A race condition in the thread management may allow local users to
cause a denial of service (deadlock) when threads are sharing
memory and waiting for a thread that has just performed an exec.

CVE-2005-3107

When one thread is tracing another thread that shares the same
memory map a local user could cause a denial of service (deadlock)
by forcing a core dump when the traced thread is in the
TASK_TRACED state.

CVE-2005-3108

A bug in the ioremap() system call has been discovered on the
amd65 architecture that could allow local users to cause a
denial of service or an information leak when performing a lookup
of a non-existant memory page.

CVE-2005-3109

The HFS and HFS+ (hfsplus) modules allow local attackers to cause
a denial of service (oops) by using hfsplus to mount a filesystem
that is not hfsplus.

CVE-2005-3110

A race ondition in the ebtables netfilter module on an SMB system
running under high load may allow remote attackers to cause a
denial of service (crash).

CVE-2005-3271

Roland McGrath discovered exec() does not properly clear
posix-timers in multi-threaded environments, which results in a
resource leak and could allow a large number of multiple local
users to cause a denial of service by using more posix-timers than
specified by the quota for a single user.

CVE-2005-3272

The kernel allows remote attackers to poison the bridge forwarding
table using frames that have already been dropped by filtering,
which can cause the bridge to forward spoofed packets.

CVE-2005-3273

The ioctl for the packet radio ROSE protocol does not properly
verify the arguments when setting a new router, which allows
attackers to trigger out-of-bounds errors.

CVE-2005-3274

A race condition in on SMP systems allows local users to cause a
denial of service (null dereference) by causing a connection timer
to expire while the connection table is being flushed before the
appropriate lock is acquired.

CVE-2005-3275

An error in the NAT code allows remote attackers to cause a denial
of service (memory corruption) by causing two packets for the same
protocol to be NATed at the same time, which leads to memory
corruption.

CVE-2005-3276

A missing memory cleanup in the thread handling routines before
copying data into userspace allows a user process to obtain
sensitive information.

This update also contains a number of corrections for issues that
turned out to have no security implication afterwards.

The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

Debian 3.1 (sarge)
Source 2.6.8-16sarge1
Alpha architecture 2.6.8-16sarge1
AMD64 architecture 2.6.8-16sarge1
HP Precision architecture 2.6.8-6sarge1
Intel IA-32 architecture 2.6.8-16sarge1
Intel IA-64 architecture 2.6.8-14sarge1
Motorola 680x0 architecture 2.6.8-4sarge1
PowerPC architecture 2.6.8-12sarge1
IBM S/390 architecture 2.6.8-5sarge1
Sun Sparc architecture 2.6.8-15sarge1

We recommend that you upgrade your kernel package immediately and
reboot the machine.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------


Source archives:

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc
Size/MD5 checksum: 1001 84ee501faac6cc5966fea3326bc5f6f0
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
Size/MD5 checksum: 961237 cd72f4d2eb2309a2d77d2ec7a3471c7c
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc
Size/MD5 checksum: 812 9b010ed11a18ae7a63ca1c0d9ce6b520
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz
Size/MD5 checksum: 37158 c1e462dc0aceed47aeba4788de1ef813

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc
Size/MD5 checksum: 1097 19abba41030b997320056d4006afaec3
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz
Size/MD5 checksum: 73962 73afecb44cda1a833afae9ade8592ae6

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.dsc
Size/MD5 checksum: 1008 f8913a5c70c8e6db41ba33582aa1eedd
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.tar.gz
Size/MD5 checksum: 65779 f6d20923c5a468b8c396f396d3f54468

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc
Size/MD5 checksum: 1047 8f17db00dbe1e0cfe9959e0ede3abad7
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz
Size/MD5 checksum: 88795 b5551e3a6f67218c2a37514b8662e4b7

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc
Size/MD5 checksum: 1191 1450b82c0ebd64a2f89e5b39b6fba66f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz
Size/MD5 checksum: 62501 04ce7a79112bf21d7732b362bf2f2a8c

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.dsc
Size/MD5 checksum: 874 cc02a1965a5236b0b56418924aeca2b2
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.tar.gz
Size/MD5 checksum: 14227 fc0f38314b443bc4375a230622c69bed

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc
Size/MD5 checksum: 1026 628e05a33d5383d644c40c44b5a262a8
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz
Size/MD5 checksum: 24891 c099d3dc524bff486e3ac3aaed728baf

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc
Size/MD5 checksum: 833 0ca25fa6cf5060acbd7f86ee78b10fcb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz
Size/MD5 checksum: 11363 cc5f02d8a1cc1c93edfd229bdcc9cb53

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc
Size/MD5 checksum: 1036 28ddac5872f5c07438473aa97b0babb0
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz
Size/MD5 checksum: 22734 5a9d2e75078588a6f94918aebc25e89b

Architecture independent components:

http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
Size/MD5 checksum: 6179472 b7388d2256a4396d2da938a687b3ab9b
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
Size/MD5 checksum: 1007230 309f32838373e76c9b61be0e6c191252
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb
Size/MD5 checksum: 34934446 65dca34768d7aa10074845d9b2f20431
http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
Size/MD5 checksum: 32120 5b04fd03ede3ae235a03624dc53e2026

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb
Size/MD5 checksum: 9182 04e70fd86504e721ad91a2b3352231d2

Alpha architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27

AMD64 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb
Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c

HP Precision architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb
Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 4972 9373407fba3ac5dd750058711dbaba35
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 5040 0e0546f2897a3a4e70efe7a564fb6aff
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 5002 ec64c94170f496062172d743aee4442a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 5068 bf99db45889934b45ce4834b9c770b16
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 4972 db66d54714fc6042db69d30918c51b02
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 5040 7712bc3701d2548903dd5b9337ab3b91
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 4994 6621e8ce1be6e3f4a8b41991d834b144
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 5064 d0f9af9891bd728a119763fddc6d3394
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 3304098 c9e4aeaa7b178b3396e8784dab38cc00
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 3097378 d1f63a282acbc6b3f6891617b9350fae
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 3010318 9b541a162fc8d966abf43c2a9fdce4d8
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 2983934 73a518deadceae9ea5ee730fbaae8c61
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 3171548 0c9ffc6fe6914da804987a43cd74e9f7
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 2975620 b1bc12e308b7abf81ae7878680f17617
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 3044876 d578ffdb0e11b61cb6446d599b160560
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 3102300 9936cab2275643f32728c4f6d4dc77ad
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge1_m68k.deb
Size/MD5 checksum: 2988830 fa46326fc2398c39d044bda9120dbea0

PowerPC architecture:

http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab
http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33
http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDoJ3eW5ql+IAeqTIRAuupAJ4nKUU9CFohdaSGaYd5FZ8qTo6cBwCeLzCc
2KaTb+N+YuOV3AMYCl5ympw=
=bZlg
-----END PGP SIGNATURE-----