Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecurityNotifies] [SECURITY] [DSA 2110-1] New Linux 2.6.26 packages fix several issues

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecurityNotifies] [SECURITY] [DSA 2110-1] New Linux 2.6.26 packages fix several issues


Chronologisch Thread 
  • From: dann frazier <dannf AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecurityNotifies] [SECURITY] [DSA 2110-1] New Linux 2.6.26 packages fix several issues
  • Date: Fri, 17 Sep 2010 09:45:07 -0600
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • Old-return-path: <dannf AT ldl.fc.hp.com>
  • Priority: urgent
  • Resent-date: Fri, 17 Sep 2010 15:45:27 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <Qnkt1lfOkwL.A.NUB.X04kMB@liszt>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
Debian Security Advisory DSA-2110-1 security AT debian.org
http://www.debian.org/security/ dann frazier
September 17, 2010 http://www.debian.org/security/faq
- ----------------------------------------------------------------------

Package : linux-2.6
Vulnerability : privilege escalation/denial of service/information leak
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2010-2492 CVE-2010-2954 CVE-2010-3078 CVE-2010-3080
CVE-2010-3081
Debian Bug(s) :

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information leak.
The Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2010-2492

Andre Osterhues reported an issue in the eCryptfs subsystem. A buffer
overflow condition may allow local users to cause a denial of service
or gain elevated privileges.

CVE-2010-2954

Tavis Ormandy reported an issue in the irda subsystem which may allow
local users to cause a denial of service via a NULL pointer dereference.

CVE-2010-3078

Dan Rosenberg discovered an issue in the XFS file system that allows
local users to read potentially sensitive kernel memory.

CVE-2010-3080

Tavis Ormandy reported an issue in the ALSA sequencer OSS emulation
layer. Local users with sufficient privileges to open /dev/sequencer
(by default on Debian, this is members of the 'audio' group) can
cause a denial of service via a NULL pointer dereference.

CVE-2010-3081

Ben Hawkes discovered an issue in the 32-bit compatibility code
for 64-bit systems. Local users can gain elevated privileges due
to insufficient checks in compat_alloc_user_space allocations.

For the stable distribution (lenny), this problem has been fixed in
version 2.6.26-25lenny1.

We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.

The following matrix lists additional source packages that were
rebuilt for compatibility with or to take advantage of this update:

Debian 5.0 (lenny)
user-mode-linux 2.6.26-1um-2+25lenny1

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, armel, hppa, i386, ia64,
mipsel,
powerpc, and sparc. Updates for other architectures will be released as they
become available.

Source archives:


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-25lenny1.diff.gz
Size/MD5 checksum: 7975777 f39bbdb91ea404d5174d636e3722c995

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-25lenny1.dsc
Size/MD5 checksum: 5778 76122adfa3afe005deb3399383a2bd32

Architecture independent packages:


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-25lenny1_all.deb
Size/MD5 checksum: 48768982 07edfb93c4b92a09d816c7142bdca0ca

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-25lenny1_all.deb
Size/MD5 checksum: 112362 26c3562b8492b990a07741994b54d5ff

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-25lenny1_all.deb
Size/MD5 checksum: 4629662 f7a91bed6e26fd5a36cb0d882df15892

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-25lenny1_all.deb
Size/MD5 checksum: 2961806 6992f6d3a88e41e804e1d1179b6f9c43

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-25lenny1_all.deb
Size/MD5 checksum: 127628 b7c6d712c237cae69a3ab3efca80cf11

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-25lenny1_all.deb
Size/MD5 checksum: 1775764 46f01e171d2686b95d916e7713b4186f

alpha architecture (DEC Alpha)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 3549986 07802097454a9b2390589322ae5fdd0d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 369380 510a2218c6555a8252a067875d04a266

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 29256966 c802037b5c8ec55577b407833d082761

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 368168 c0371024df5627494dc52608c1e8103d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 746228 e82d527378541628d7fa8900392397e1

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 368502 851afa03887c911d720537a7d1912ba6

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 28538350 4de6c7b1ef426eab39f3c2c072db66b2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 28554916 9d6d6c595baf1cd65347f179345aa31c

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 111792 dea8e7654a358026b4d20584a6dffdd0

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-25lenny1_alpha.deb
Size/MD5 checksum: 111814 ae09bcf59bcc6760263c4ea6aa433f97

amd64 architecture (AMD x86_64 (AMD64))


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 388790 7c86a9dd48e5a33e4c8e1b5c2444d9c3

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 111808 e2b9702e9fb841a96b58cb54a781ff79

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 1810904 732babcb7b1553e9ca820af09eb5e751

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 3858242 96e1a893526e375449669a5f8223da3d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 754576 2bcb5ad8d085122f09f511e889748733

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 3726100 ccce34f02e2a830104b8ab382ccc99bd

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 392518 61772c13e9b02a27f5e95537d35c2bb6

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 19315868 c1f6fe11f2dcbb9eb1af125ccb9f1ade

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 3758716 8d3eb9917ddace77306a548996805673

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 21104878 ea349768d9a3ffe0ab369b02e917a101

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 3781818 f994d959cedda9345be916f4f312f2ca

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 20952030 f36fba80058e5f7b234c6ee36150deae

http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 111764 920541f7b72027e0da4bfc4aa63beee3

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 111778 69b6d2bf2a8c278b19dedb5fa6aee4eb

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 393222 1f4f1e0c552efcbf170e91256bc68f95

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 20933388 a0a65295aa7af4e66b55de4f5a127944

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-25lenny1_amd64.deb
Size/MD5 checksum: 398324 7de369ae359af5f1352af23059645f94

armel architecture (ARM EABI)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 11407714 a761f7bce6ef511ddd2276a988a466fe

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 370450 07e6cef2d938c10d130371639edb2122

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 9614650 3ffea17a7f9bd745de670e7b3b2503f7

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 4140842 502d2fe0bc4d81e1cba4dcb98ebd1f60

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 338478 469db33c30338d535fa9a7e528469f67

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 11689112 0ffd863b5e7c662d4f6d2bf2f59a4ff6

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 111854 fb76d6121dedbb8ec8b33e1b01b03315

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 367108 88e0cd3b33e009b25a125e364310d1f2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 752636 ba29e2c2cae476e8e6b9510af225f017

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 111890 14e2af7a33d2109cc137dc09decf2789

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 363932 f8f941697bb5acbfb06545da94e547ce

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-25lenny1_armel.deb
Size/MD5 checksum: 12449996 d9fa768a2d39d1bc70371f08f18b03b2

hppa architecture (HP PA RISC)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 15791418 3ce7b2434ff4ee44cbb73843798f07b8

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 304368 8755bd46656aa44a511fb0029d4894ac

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 303570 6447225e2c3a9d654fff7e78ce4ba237

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 304970 d5ea8e0c886512a289f5da570621e6ea

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 17134742 044c504ee53718a19cacf4f9b4d37eae

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 302674 a7060c482662a37d76f8ddaa3959727b

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 111812 9a31f11a9bd9639597d49274d4962784

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 17683214 a01357633250b3f66683cf5c23c90140

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 3600256 8a691b65e874666bec4b9a7203374660

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 111788 3f0e0ad2f10d5f0d92e0b79188a49ae2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 764326 bb90e85d9dd992258a72a9c5aaec5b5e

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-25lenny1_hppa.deb
Size/MD5 checksum: 16391814 59f5ff30b08f5ed187a0ed90093c2d00

i386 architecture (Intel ia32)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 111906 1c995ded6f8492e88b7e9ab3414499de

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 1598086 c93c8f80ce38d5dc8317d425d478a871

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 20413948 dfb5c9d2bbb2c50fed543c0f7bce2634

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 18201338 45e0560c8d129a1e124d39b13585b22e

http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 111844 0e88c53388199724dbd1929597b8bcfd

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 413204 18a8ca0d7f962fae7fd76fa4b5fc320d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 111846 ffbedc36d002ebf1f94d9dec0ce66200

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 411934 39b241f9ba99a5dba80438bcfb91d9b2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 20534326 f386b72470556ca67d6cb95142f2c401

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 21029192 81e1714cf6cb1f769bda8a1dd3600bd4

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 412460 51b76eb19b3994180db52057ec18c149

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 3949316 7ff8df817cb1dab2307555c7235f18d6

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 413416 138d1ef5e16fa04ce6af8a0a8dbfb830

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 400960 bb801a4771cab63544ce46737e89880f

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 20508562 793ec95764c505fee44b15cc2e223ccf

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 3867512 89accc978a4d8971b053da75444d1724

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 3843962 1efbb8b49ca19dd4168e67b2c85a0340

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 768644 2279eb4b90cf87159f9cca7851ce307c

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 399658 b55ef231a667680f5dadb286e3228690

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 20352826 aefd977e7d594e3eedbd5fad21cb3ce8

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 3809078 98463846b73b525e9312b73987a20be5

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 20383054 fb4dad3198c6688a224d7cc627ebc595

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 20684446 b82b26d8f81b1a4fc71061103f904a92

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 420374 a2b5537a922ea21b34c20bfc9b3db1ae

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-25lenny1_i386.deb
Size/MD5 checksum: 413274 d0868663d8b734e4d99d610eff666231

ia64 architecture (Intel ia64)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 365440 ff879931fee914ed85cb033836f84c65

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 366924 ebda80908653305fb5a6a6899d1331a0

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 365778 07accd56af5543c0fef20cbb3b068998

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 34536240 86a3e7624fbe6acc3a5d0d851a593dd1

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 34362466 8874bf431329a32b774dcbab0e41e338

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 34467922 9ef85dcf49cbe4353e6c9744e9560439

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 3727594 85a140aaf943602a389ac4759fb72f34

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 365138 60e70a32ba8fa65b1e5182377648177d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 111784 5e279e9fcc80bfdaec02ea1f51b418de

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 3762334 31791b660bdcc85f0539406f2c0558be

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 768138 122e994060ec48929dc4e4f5993ae7d8

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 34286140 39e897ae2f3b84d15eb8d5c605fe258f

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-25lenny1_ia64.deb
Size/MD5 checksum: 111814 da3e8b1483d254ad6940ac7952fa9b1e

mipsel architecture (MIPS (Little Endian))


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 111836 3facf15fcb9e0a88f975dc3beae8696a

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 19623042 d492982ccce2bf7f25d6f7cfd4bfeed2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 747276 055da45cbcc6f7c9ed60aa0394729d7a

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 28490352 5adb323a9481ec08ce1994feaf294149

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 22966726 52751e384989910d555c877d0ae43937

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 300520 9da06382dffe3584409610a8b16a1711

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 19634438 7650cb94c949ad29438c2be916d32ac4

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 3897008 8a6e8f8277e57ccf3d9a255bedc669bf

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 299946 c20bad9ee5b97a68cbd7b8bb0b0c3e03

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 354226 61603c54f33879f8731adeee447538bf

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 15004398 3c8e36a1745c5ea5d0295f35edbdf0c6

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 355330 cdbc0aa4114a9b446973ea9ddd65d252

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 295028 2b248539505946e829161c41247fe6ba

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_mipsel.deb
Size/MD5 checksum: 111788 d0cdb75f35ccbf7d50236c4263c42696

powerpc architecture (PowerPC)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 23682314 54c8c509e9c42bb7a2563e707e3bc752

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 3855052 80b26ea5df78659e28b99b976a988d30

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 372728 660ab7e4cdcdf5e93cb769256d3d93e7

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 3890440 d42abc4ac1b6350e2bddb629b3fac9ba

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 761070 a18d6bd2c78261b796d10d3d7293524d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 373504 791bf4dab71c3a52ec214004bece814f

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 23714616 03f7a29bbe48563efd27b3942a9b2518

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 377812 2249dda34712ccab222fd66e7ee30be2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 23285306 348f9f5b16f5531ff7db6df7f84a13e6

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 371300 870a09f0c2cfa745c50127f480fa06ef

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 111850 aa040723eb09f3f756dc72d5cedfd2c2

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 23536242 1f13f2174d3fa5906ae33fe5c38fa952

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 111894 0e5017b2e7e284fcb71600b515e24944

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 380094 01a28641358fd8f82ec1a874983da0db

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-25lenny1_powerpc.deb
Size/MD5 checksum: 23594128 ab3016e68b95ea59706a6939c7cd388d

sparc architecture (Sun SPARC/UltraSPARC)


http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 3824368 1d1fedbb7562c394db96812ec09f007d

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 111790 543eeff824aa5a76fd950384076eae5c

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 306798 6183c37b09cfcb83c3877a2bad962134

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 14634462 3327721f9131905880c9fc43315629a3

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 308886 c1ee4104734d2ecef10e905ce857dee8

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 803352 60dd14d0f949a6ee484ace2e47a8d064

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 3789714 24090045b578ca83e8b5f763b07cbef0

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 111810 e0e4c6827133df59b68b1e78a2554303

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 308612 ce0427567c4c300d1da0d9a1c8ec28be

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 14611760 5db83e9585e6b9ecf5564e521799c30b

http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-25lenny1_sparc.deb
Size/MD5 checksum: 14290950 a038e19bde88404a3bdae760922401ef

These files will probably be moved into the stable distribution on
its next update.

-
---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce AT lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFMk4ybhuANDBmkLRkRApOZAJ41F/fXUvTxRIRFQRDxXyN+UsiaogCglxQg
oT2vAODO9/cd0Z0gpqprhM0=
=AgM8
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: 20100917154503.GA23599 AT ldl.fc.hp.com">http://lists.debian.org/20100917154503.GA23599 AT ldl.fc.hp.com




  • [IT-SecurityNotifies] [SECURITY] [DSA 2110-1] New Linux 2.6.26 packages fix several issues, dann frazier, 17.09.2010

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang