TITLE: Debian update for kernel-source-2.6.8 SECUNIA ADVISORY ID: SA18056 VERIFY ADVISORY: http://secunia.com/advisories/18056/ CRITICAL: Less critical IMPACT: Unknown, Security Bypass, Exposure of sensitive information, Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for kernel-source-2.6.8. This fixes some vulnerabilities, which can be exploited by malicious, local users with an unknown impact, to cause a DoS (Denial of Service), to gain knowledge of potentially sensitive and to gain escalated privileges, or by malicious people to bypass certain security restrictions and potentially to cause a DoS. For more information: SA13654 SA15630 SA15416 SA15786 SA15812 SA16298 SA16355 SA12525 SA14295 SA14585 SA16494 Note: A resource leak in the handling of POSIX timers in the exec() function has also been fixed. SOLUTION: Apply updated packages. Refer to the vendor's patch matrix for more information on the fixed versions for the different architectures. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc Size/MD5 checksum: 1001 84ee501faac6cc5966fea3326bc5f6f0 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz Size/MD5 checksum: 961237 cd72f4d2eb2309a2d77d2ec7a3471c7c http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc Size/MD5 checksum: 812 9b010ed11a18ae7a63ca1c0d9ce6b520 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz Size/MD5 checksum: 37158 c1e462dc0aceed47aeba4788de1ef813 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc Size/MD5 checksum: 1097 19abba41030b997320056d4006afaec3 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz Size/MD5 checksum: 73962 73afecb44cda1a833afae9ade8592ae6 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.dsc Size/MD5 checksum: 1008 f8913a5c70c8e6db41ba33582aa1eedd http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.tar.gz Size/MD5 checksum: 65779 f6d20923c5a468b8c396f396d3f54468 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc Size/MD5 checksum: 1047 8f17db00dbe1e0cfe9959e0ede3abad7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz Size/MD5 checksum: 88795 b5551e3a6f67218c2a37514b8662e4b7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc Size/MD5 checksum: 1191 1450b82c0ebd64a2f89e5b39b6fba66f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz Size/MD5 checksum: 62501 04ce7a79112bf21d7732b362bf2f2a8c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.dsc Size/MD5 checksum: 874 cc02a1965a5236b0b56418924aeca2b2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.tar.gz Size/MD5 checksum: 14227 fc0f38314b443bc4375a230622c69bed http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc Size/MD5 checksum: 1026 628e05a33d5383d644c40c44b5a262a8 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz Size/MD5 checksum: 24891 c099d3dc524bff486e3ac3aaed728baf http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc Size/MD5 checksum: 833 0ca25fa6cf5060acbd7f86ee78b10fcb http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz Size/MD5 checksum: 11363 cc5f02d8a1cc1c93edfd229bdcc9cb53 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc Size/MD5 checksum: 1036 28ddac5872f5c07438473aa97b0babb0 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz Size/MD5 checksum: 22734 5a9d2e75078588a6f94918aebc25e89b Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb Size/MD5 checksum: 6179472 b7388d2256a4396d2da938a687b3ab9b http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb Size/MD5 checksum: 1007230 309f32838373e76c9b61be0e6c191252 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb Size/MD5 checksum: 34934446 65dca34768d7aa10074845d9b2f20431 http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb Size/MD5 checksum: 32120 5b04fd03ede3ae235a03624dc53e2026 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb Size/MD5 checksum: 9182 04e70fd86504e721ad91a2b3352231d2 Alpha architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27 AMD64 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c HP Precision architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 4972 9373407fba3ac5dd750058711dbaba35 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 5040 0e0546f2897a3a4e70efe7a564fb6aff http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 5002 ec64c94170f496062172d743aee4442a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 5068 bf99db45889934b45ce4834b9c770b16 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 4972 db66d54714fc6042db69d30918c51b02 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 5040 7712bc3701d2548903dd5b9337ab3b91 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 4994 6621e8ce1be6e3f4a8b41991d834b144 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 5064 d0f9af9891bd728a119763fddc6d3394 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 3304098 c9e4aeaa7b178b3396e8784dab38cc00 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 3097378 d1f63a282acbc6b3f6891617b9350fae http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 3010318 9b541a162fc8d966abf43c2a9fdce4d8 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 2983934 73a518deadceae9ea5ee730fbaae8c61 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 3171548 0c9ffc6fe6914da804987a43cd74e9f7 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 2975620 b1bc12e308b7abf81ae7878680f17617 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 3044876 d578ffdb0e11b61cb6446d599b160560 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 3102300 9936cab2275643f32728c4f6d4dc77ad http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge1_m68k.deb Size/MD5 checksum: 2988830 fa46326fc2398c39d044bda9120dbea0 PowerPC architecture: http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03 http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33 http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43 ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-922 OTHER REFERENCES: SA13654: http://secunia.com/advisories/13654/ SA15630: http://secunia.com/advisories/15630/ SA15416: http://secunia.com/advisories/15416/ SA15786: http://secunia.com/advisories/15786/ SA15812: http://secunia.com/advisories/15812/ SA16298: http://secunia.com/advisories/16298/ SA16355: http://secunia.com/advisories/16355/ SA12525: http://secunia.com/advisories/12525/ SA14295: http://secunia.com/advisories/14295/ SA14585: http://secunia.com/advisories/14585/ SA16494: http://secunia.com/advisories/16494/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------