DSA 1787-1: New Linux 2.6.24 packages fix several vulnerabilities  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
Debian Security Advisory DSA-1787-1 security@debian.org
http://www.debian.org/security/ Dann Frazier
May 2, 2009 http://www.debian.org/security/faq
- ----------------------------------------------------------------------

Package : linux-2.6.24
Vulnerability : denial of service/privilege escalation/information leak
Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2008-4307 CVE-2008-5079 CVE-2008-5395 CVE-2008-5700
CVE-2008-5701 CVE-2008-5702 CVE-2009-0028 CVE-2009-0029
CVE-2009-0031 CVE-2009-0065 CVE-2009-0269 CVE-2009-0322
CVE-2009-0675 CVE-2009-0676 CVE-2009-0745 CVE-2009-0834
CVE-2009-0859 CVE-2009-1046 CVE-2009-1192 CVE-2009-1242
CVE-2009-1265 CVE-2009-1337 CVE-2009-1338 CVE-2009-1439

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2008-4307

Bryn M. Reeves reported a denial of service in the NFS filesystem.
Local users can trigger a kernel BUG() due to a race condition in
the do_setlk function.

CVE-2008-5079

Hugo Dias reported a DoS condition in the ATM subsystem that can
be triggered by a local user by calling the svc_listen function
twice on the same socket and reading /proc/net/atm/*vc.

CVE-2008-5395

Helge Deller discovered a denial of service condition that allows
local users on PA-RISC systems to crash a system by attempting to
unwind a stack contiaining userspace addresses.

CVE-2008-5700

Alan Cox discovered a lack of minimum timeouts on SG_IO requests,
which allows local users of systems using ATA to cause a denial of
service by forcing drives into PIO mode.

CVE-2008-5701

Vlad Malov reported an issue on 64-bit MIPS systems where a local
user could cause a system crash by crafing a malicious binary
which makes o32 syscalls with a number less than 4000.

CVE-2008-5702

Zvonimir Rakamaric reported an off-by-one error in the ib700wdt
watchdog driver which allows local users to cause a buffer
underflow by making a specially crafted WDIOC_SETTIMEOUT ioctl
call.

CVE-2009-0028

Chris Evans discovered a situation in which a child process can
send an arbitrary signal to its parent.

CVE-2009-0029

Christian Borntraeger discovered an issue effecting the alpha,
mips, powerpc, s390 and sparc64 architectures that allows local
users to cause a denial of service or potentially gain elevated
privileges.

CVE-2009-0031

Vegard Nossum discovered a memory leak in the keyctl subsystem
that allows local users to cause a denial of service by consuming
all of kernel memory.

CVE-2009-0065

Wei Yongjun discovered a memory overflow in the SCTP
implementation that can be triggered by remote users, permitting
remote code execution.

CVE-2009-0269

Duane Griffin provided a fix for an issue in the eCryptfs
subsystem which allows local users to cause a denial of service
(fault or memory corruption).

CVE-2009-0322

Pavel Roskin provided a fix for an issue in the dell_rbu driver
that allows a local user to cause a denial of service (oops) by
reading 0 byts from a sysfs entry.

CVE-2009-0675

Roel Kluin discovered inverted logic in the skfddi driver that
permits local, unprivileged users to reset the driver statistics.

CVE-2009-0676

Clement LECIGNE discovered a bug in the sock_getsockopt function
that may result in leaking sensitive kernel memory.

CVE-2009-0745

Peter Kerwien discovered an issue in the ext4 filesystem that
allows local users to cause a denial of service (kernel oops)
during a resize operation.

CVE-2009-0834

Roland McGrath discovered an issue on amd64 kernels that allows
local users to circumvent system call audit configurations which
filter based on the syscall numbers or argument details.

CVE-2009-0859

Jiri Olsa discovered that a local user can cause a denial of
service (system hang) using a SHM_INFO shmctl call on kernels
compiled with CONFIG_SHMEM disabled. This issue does not affect
prebuilt Debian kernels.

CVE-2009-1046

Mikulas Patocka reported an issue in the console subsystem that
allows a local user to cause memory corruption by selecting a
small number of 3-byte UTF-8 characters.

CVE-2009-1192

Shaohua Li reported an issue in the AGP subsystem they may allow
local users to read sensitive kernel memory due to a leak of
uninitialized memory.

CVE-2009-1242

Benjamin Gilbert reported a local denial of service vulnerability
in the KVM VMX implementation that allows local users to trigger
an oops.

CVE-2009-1265

Thomas Pollet reported an overflow in the af_rose implementation
that allows remote attackers to retrieve uninitialized kernel
memory that may contain sensitive data.

CVE-2009-1337

Oleg Nesterov discovered an issue in the exit_notify function that
allows local users to send an arbitrary signal to a process by
running a program that modifies the exit_signal field and then
uses an exec system call to launch a setuid application.

CVE-2009-1338

Daniel Hokka Zakrisson discovered that a kill(-1) is permitted to
reach processes outside of the current process namespace.

CVE-2009-1439

Pavan Naregundi reported an issue in the CIFS filesystem code that
allows remote users to overwrite memory via a long
nativeFileSystem field in a Tree Connect response during mount.

For the stable distribution (etch), these problems have been fixed in
version 2.6.24-6~etchnhalf.8etch1.

We recommend that you upgrade your linux-2.6.24 packages.

Note: Debian 'etch' includes linux kernel packages based upon both the
2.6.18 and 2.6.24 linux releases. All known security issues are
carefully tracked against both packages and both packages will receive
security updates until security support for Debian 'etch'
concludes. However, given the high frequency at which low-severity
security issues are discovered in the kernel and the resource
requirements of doing an update, lower severity 2.6.18 and 2.6.24
updates will typically release in a staggered or "leap-frog" fashion.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch1.diff.gz
Size/MD5 checksum: 4033829 ff5f9342fbd061dcab316080057bf9ac
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch1.dsc
Size/MD5 checksum: 5117 c71acfa6a187429a702d368e5974d082
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz
Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af

Architecture independent packages:

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.8etch1_all.deb
Size/MD5 checksum: 82422 f39c24b3acf13eee80ab07421e120bc7
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.8etch1_all.deb
Size/MD5 checksum: 4260850 8b0891fa602714572b2ea8be13d4b2eb
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.8etch1_all.deb
Size/MD5 checksum: 96802 317936645be453126afab54705999059
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.8etch1_all.deb
Size/MD5 checksum: 1542086 460bc638a040b2674f4da6e30fc975f1
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.8etch1_all.deb
Size/MD5 checksum: 46865722 b3afc19906294f1990ab97e6c8943285
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.8etch1_all.deb
Size/MD5 checksum: 917482 dc533207197184a44dcc931372534b0b

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 82038 12269f5ccc3251bed6544c82ace6bab8
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 26736698 8714134f74ad24d4a761d9e1b18c84dc
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 332080 2632341b6c0d98b6798103d4e03a4980
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 26757530 c00a3280cf8bc9d18e52c64202af9e34
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 27341904 ee355aab70b9061c511e7152929c150a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 331054 7d30fb320e409180de47bdf7be8430c2
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 3454072 01417e58c71bb9515a4011c390be0580
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 82010 cff77bfb7491d357acc7d9d50dc0217e
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch1_alpha.deb
Size/MD5 checksum: 330926 1b2c38a3628e25cc62b7e555800d48e5

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch1_amd64.deb
Size/MD5 checksum: 19480638 9f9f06adb37a611ed3f24000859beb03
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_amd64.deb
Size/MD5 checksum: 3654580 aac989a8eee05d7adaf9731dfdda062f
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch1_amd64.deb
Size/MD5 checksum: 344960 4a6f4ac493086ec243734b3b6968a2bd
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.8etch1_amd64.deb
Size/MD5 checksum: 82010 f7713fceebf11933dd20c7db1c636df0
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_amd64.deb
Size/MD5 checksum: 81998 7f2d31a9d80ae34c397d90912dbbb46f

arm architecture (ARM)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 308926 05539199c8e837c4fccc75172a9c82be
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 82136 39e67aa9c8617379a54c9f36d0d72572
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 3939598 804e621a444954f2045f27a9282ae77a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 306808 3086d994c254c2481c6610729c6ee182
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 296510 23d73ccad75398f169ad602db513b908
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 9351566 c0326566806f5c7ed8de2342f4de857a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 10775966 6661bd851503d953c4ca43b6f8e85deb
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 10768304 daca396e0f5decdfe92a7724069daa50
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.8etch1_arm.deb
Size/MD5 checksum: 82166 8bb034ce3157aeefe7c3c692ebe14df4

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 261644 7c1852bbe840ac3d90c12d452e2681cf
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 82016 293d2bba2cb8563e700377ada35f2ba2
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 259304 f3db74269efbac5501598e35a462bf20
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 82038 bdae604446c924296cd1aac5b9be7e95
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 13332816 5d9819ffa069392df46ad94e193cbdf1
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 258452 c1a9dde9f1c92b4563126d1937d4eec2
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 14385162 6cbd8dc0702e5cb15237d246883dd2c0
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 258378 4a864d5f74cd4f1e05362aa00e94236a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 14847618 ab5989ffb84c1780ba7a8d06ac501f67
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 3439250 22ebf43e46ee15c1240d6881c2554248
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch1_hppa.deb
Size/MD5 checksum: 13845394 731ba27a151e94071c8f64ceb0da9e92

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 360908 aef486d9faf9aca0e61ea01e16d0cbc8
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 19348860 15a2e2dc1fa2b3b423d3010272f7f3f6
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 82124 ee99a97dc91f3c2e205bce0b901904c0
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 359834 d80f275632e07acaaa02679eee976bb6
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 82160 07df09b3f1af03cd0f20d2b0cf2b679a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 347518 a3530c65c732ef54f207a3551c85ec9f
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 19344944 28d8879c242e0698ee8524d006970445
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 361402 3bad41e46bd717ebe8d15e0473f130eb
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 19589084 a8319258d3194cd59fa263a1b66a5626
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 19278254 608362b1503eb3ec838bd01152d7aa93
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_i386.deb
Size/MD5 checksum: 3647296 a6ce4748c3fefd49a40ebbfed1e004f9

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 318210 76ad07637a2fac8a32d827c23f893ffa
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 32025152 eb4eec0df149a61e18ae22ef8c50eb43
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 318482 a155708aa4e74d90e54a4f107221c995
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 3567324 0e1d20a7ecbf444ad6aba30cc169963d
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 82000 f66623c2c53891b0d92055fb032d0592
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 32206190 62738a79d48dffcad324124d2b73f3d4
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.8etch1_ia64.deb
Size/MD5 checksum: 82028 6aa864922de84ad84cfff13eb9ce71ee

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 308452 f5d33880c20e98b12a9ad5ef53743910
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 214502 a39b0ecffd3a215979f8e5bcdcd78bfe
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 17166576 38a62721888bbb2f0fc4d7fbdba70c9e
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 82062 3aa3ea6a854d046759d5824257e47bf3
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 17151594 603b866be5168c042bbef832eb253c9d
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 10522386 725913ed966df3029d3f72332af590fd
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 225228 e8ad107d20c67c798cdb093ae150592c
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 246218 69eee0d55e37c414da07e70b90c190a9
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 11957416 9d75b25a0668735d4bfb1fac77788723
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 27772372 307325283c10af9dd6dc8cb4f0de39a7
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 246310 815dfe8f02f354f03f0d63f8605bedd9
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 22150880 d183f2a93f59d18034573fd7febf5e22
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 3803446 4448552a0dd930e3d51a800c1d6deb50
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 82008 871aace093a3411d3d01dfcc19e57a7a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch1_mips.deb
Size/MD5 checksum: 309908 ebc141db56c3f149eaf265af89054e03

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 3803432 926f0974edf97ded8ef4bd4f99847b35
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 245716 9a62f6221f1b1e36c8b397e5afcb966a
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 82060 401c4c5fb02f54a0deacef21bf630b0e
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 26982892 39032aaca4b2a6cecc7091022a42e2b7
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 16629962 874a967e72aa10398626267cb2d5ba54
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 21732318 7819062b50720a60a098d086978298ea
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 82012 06886337047db3ad1df77cc919c4cff6
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 246190 ec4b8f66e8a0065d694f990745049e7e
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 16566324 d778d8f7f199e49cb087fafaef7eb551
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 13316760 aadc4a462ca185163c902551556c92f6
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 309226 44e7866afb834db0bf71a9d034d729ba
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 308360 e53f7681e10aa6b07d1ea3e3b58622da
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch1_mipsel.deb
Size/MD5 checksum: 245984 a572ee84ea19bb4bb908e6c20a56ca37

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 19194974 99103ae37f6001139ea44dd31f84183f
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 320916 0ba37f3d80f38b92b9097ea7e90fb3e7
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 320840 0ab836295bc998d5b54f9d54bb2bd23c
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 19485870 bbee80ba2e47827a9f8ac2360ccf9e68
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 3672412 4ff49fe861ab4f49eec95d425114c349
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 82012 03d29f46bdcab8bab20d237a294fc242
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 295058 7718f3ba536f4af7252961bbbbab24be
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 21169748 db5e60f6e3ba1fcd12a793fd30f75c14
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 17459470 60369530c57a669b6c9bcd441f757417
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 322436 779ccace55f22bdcf1ccd9212033b58d
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.8etch1_powerpc.deb
Size/MD5 checksum: 82046 39a3cbedcbc4e13f997b7641394e3ad0

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 1501738 7bf06e1f51092c18b512045444fba8e9
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 193848 6713da5dfd8696c27718075e6cb3fa03
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 82016 1668a7a797859f5d9e0a7af2ba1781b4
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 6950110 9f8a8d765c71aaee7e94402626f413a1
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 82002 0f37b246336adf27ce4d37776257ff95
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 7200396 de8ace94802f259aef088e9384a4ca6b
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 194084 ea695f010b1916d50f1bdad2e85dd1f0
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_s390.deb
Size/MD5 checksum: 3429706 8a40f944fa6b7c64353d76154bded277

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 82152 88b0f93df760ac992f30c1927d0144f7
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 3652306 42dda4de967328363df86bee8ba0c53b
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 13022916 93538efd19eae1488128df8a3a73b957
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 263066 c796e2fd4e51ff6a66d9eec594c81386
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 13317632 e50f9515e67c38d66c58f317bf2c9292
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 264930 a1d0ba75ee8eded18b4d97327ebd0291
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch1_sparc.deb
Size/MD5 checksum: 82128 6c1ebe596b196e25cb0307f78ab1f358


These changes will probably be included in the oldstable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJ/JE8huANDBmkLRkRAlzXAJwJvkPuUoKwLYQPFVnF7t2DRIkzjQCgg8zC
w+zXZAH5HPrUZ78bMIHk8Sw=
=KhiR
-----END PGP SIGNATURE-----
"

RHSA-2009:0451-02 Important: kernel-rt security and bug fix update  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel-rt security and bug fix update
Advisory ID: RHSA-2009:0451-02
Product: Red Hat Enterprise MRG for RHEL-5
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0451.html
Issue date: 2009-04-29
CVE Names: CVE-2008-4307 CVE-2009-0028 CVE-2009-0834
CVE-2009-0835 CVE-2009-1046 CVE-2009-1337
=====================================================================

1. Summary:

Updated kernel-rt packages that fix several security issues and a bug are
now available for Red Hat Enterprise MRG 1.1.2.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

MRG Realtime for RHEL 5 Server - i386, noarch, x86_64

3. Description:

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

* a logic error was found in the do_setlk() function of the Linux kernel
Network File System (NFS) implementation. If a signal interrupted a lock
request, the local POSIX lock was incorrectly created. This could cause a
denial of service on the NFS server if a file descriptor was closed before
its corresponding lock request returned. (CVE-2008-4307, Important)

* a deficiency was found in the Linux kernel system call auditing
implementation on 64-bit systems. This could allow a local, unprivileged
user to circumvent a system call audit configuration, if that configuration
filtered based on the "syscall" number or arguments.
(CVE-2009-0834, Important)

* Chris Evans reported a deficiency in the Linux kernel secure-computing
implementation on 64-bit systems. This could allow a local, unprivileged
user to bypass intended access restrictions, if those access restriction
filters were based on the "syscall" number or arguments.
(CVE-2009-0835, Important)

* the exit_notify() function in the Linux kernel did not properly reset the
exit signal if a process executed a set user ID (setuid) application before
exiting. This could allow a local, unprivileged user to elevate their
privileges. (CVE-2009-1337, Important)

* Chris Evans reported a deficiency in the Linux kernel signals
implementation. The clone() system call permits the caller to indicate the
signal it wants to receive when its child exits. When clone() is called
with the CLONE_PARENT flag, it permits the caller to clone a new child that
shares the same parent as itself, enabling the indicated signal to be sent
to the caller's parent (instead of the caller), even if the caller's parent
has different real and effective user IDs. This could lead to a denial of
service of the parent. (CVE-2009-0028, Moderate)

* an off-by-two error was found in the set_selection() function of the
Linux kernel. This could allow a local, unprivileged user to cause a denial
of service when making a selection of characters in a UTF-8 console. Note:
physical console access is required to exploit this issue.
(CVE-2009-1046, Low)

These updated packages also fix the following bug:

* the __scsi_device_lookup_by_target() function was always returning the
first matching device, regardless of the state of the device. This meant
that any valid device listed after a deleted device would not be found. The
__scsi_device_lookup_by_target() function was modified so that deleted
devices are skipped, and valid devices are now found. (BZ#495976)

All Red Hat Enterprise MRG users should install this update, which resolves
these issues. For this update to take effect, the system must be rebooted.

4. Solution:

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

456282 - CVE-2008-4307 Kernel BUG() in locks_remove_flock
479932 - CVE-2009-0028 Linux kernel minor signal handling vulnerability
487255 - CVE-2009-0835 kernel: x86-64: seccomp: 32/64 syscall hole
487990 - CVE-2009-0834 kernel: x86-64: syscall-audit: 32/64 syscall hole
491787 - CVE-2009-1046 kernel: utf8 selection memory corruption
493771 - CVE-2009-1337 kernel: exit_notify: kill the wrong capable(CAP_KILL) check

6. Package List:

MRG Realtime for RHEL 5 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/kernel-rt-2.6.24.7-111.el5rt.src.rpm

i386:
kernel-rt-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-debug-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-debug-debuginfo-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-debug-devel-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-debuginfo-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-debuginfo-common-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-devel-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-trace-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-trace-debuginfo-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-trace-devel-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-vanilla-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-vanilla-debuginfo-2.6.24.7-111.el5rt.i686.rpm
kernel-rt-vanilla-devel-2.6.24.7-111.el5rt.i686.rpm

noarch:
kernel-rt-doc-2.6.24.7-111.el5rt.noarch.rpm

x86_64:
kernel-rt-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-debug-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-debug-debuginfo-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-debug-devel-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-debuginfo-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-debuginfo-common-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-devel-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-trace-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-trace-debuginfo-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-trace-devel-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-vanilla-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-vanilla-debuginfo-2.6.24.7-111.el5rt.x86_64.rpm
kernel-rt-vanilla-devel-2.6.24.7-111.el5rt.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4307
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFJ+DH7XlSAg2UNWIIRAuPjAJ9gKgsyAIK5at18acHpmHl+NaNncACeMPxj
nzPTYCBjX11hkMphizFzvDI=
=qlVP
-----END PGP SIGNATURE-----
"

DSA 1783-1: New mysql-dfsg-5.0 packages fix multiple vulnerabilities  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1783 security@debian.org
http://www.debian.org/security/ Devin Carraway
April 29, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : mysql-dfsg-5.0
Vulnerability : multiple
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2008-3963 CVE-2008-4456
Debian Bug : 498362

Multiple vulnerabilities have been identified affecting MySQL, a
relational database server, and its associated interactive client
application. The Common Vulnerabilities and Exposures project
identifies the following two problems:

CVE-2008-3963

Kay Roepke reported that the MySQL server would not properly handle
an empty bit-string literal in an SQL statement, allowing an
authenticated remote attacker to cause a denial of service (a crash)
in mysqld. This issue affects the oldstable distribution (etch), but
not the stable distribution (lenny).

CVE-2008-4456

Thomas Henlich reported that the MySQL commandline client application
did not encode HTML special characters when run in HTML output mode
(that is, "mysql --html ..."). This could potentially lead to
cross-site scripting or unintended script privilege escalation if
the resulting output is viewed in a browser or incorporated into
a web site.

For the old stable distribution (etch), these problems have been fixed in
version 5.0.32-7etch10.

For the stable distribution (lenny), these problems have been fixed in
version 5.0.51a-24+lenny1.

We recommend that you upgrade your mysql-dfsg-5.0 packages.


Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch10.diff.gz
Size/MD5 checksum: 316316 8b223eaabb58e59dd94eb0d4a8c92aea
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz
Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch10.dsc
Size/MD5 checksum: 1119 dcbded9cba0e19d190fc2f77f134c550

Architecture independent packages:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch10_all.deb
Size/MD5 checksum: 48356 e97c3e229d72842f1dd5b4ee7f1251ce
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch10_all.deb
Size/MD5 checksum: 46278 58c0f9871167c5cea7ef590300c1f615
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch10_all.deb
Size/MD5 checksum: 55042 5e386582b3fd7d2b81f1ade654a00057

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_alpha.deb
Size/MD5 checksum: 8906160 a16ce759550234c3f2dd0951a6eb89b4
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_alpha.deb
Size/MD5 checksum: 27247262 396f7d23a26b3811c1962556e4178a29
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_alpha.deb
Size/MD5 checksum: 1947978 6dafad44578cfa7b49b923351c3bd103
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_alpha.deb
Size/MD5 checksum: 48372 c0729575a598fb0265280781b7365834
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_alpha.deb
Size/MD5 checksum: 8405666 3464e330822fb59efbeafacd2e40ede4

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_amd64.deb
Size/MD5 checksum: 1832088 357250a49039aa2ccaa55f25e8e3968e
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_amd64.deb
Size/MD5 checksum: 7381776 3638e4cd74fbbc929adb68d260c7a485
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_amd64.deb
Size/MD5 checksum: 7548200 bdc8d651e463e0c4b7ed287b7ca1f43c
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_amd64.deb
Size/MD5 checksum: 48378 4160e8467f4590b4e9f9be20acdd778d
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_amd64.deb
Size/MD5 checksum: 25941038 081d5f54c7e3be08c7e8776e78e874a6

arm architecture (ARM)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_arm.deb
Size/MD5 checksum: 48434 b4f7a8ce2d9b4db432b0f8255751b313
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_arm.deb
Size/MD5 checksum: 7208068 0c231cb7c1f1c44a44632721e3686a9f
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_arm.deb
Size/MD5 checksum: 1748598 9390f41e7016ad267e49ff35c42069a9
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_arm.deb
Size/MD5 checksum: 6931012 124a12ba4d32234f8a7eecefbc65ca1f
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_arm.deb
Size/MD5 checksum: 25347856 7f872c65f8e45ca4b73e938a421a41fe

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_hppa.deb
Size/MD5 checksum: 1922874 8af809572a8f0970dac614e56d0a2d99
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_hppa.deb
Size/MD5 checksum: 8055770 e979e708351b181f66a87c3fc3e44c9a
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_hppa.deb
Size/MD5 checksum: 8005312 2b073a674f3bca0c3556cb25e8a62f10
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_hppa.deb
Size/MD5 checksum: 48374 3a4f39c4a25745201127193910de9ee6
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_hppa.deb
Size/MD5 checksum: 27179176 d66966c0e6f071fe5a3e81127d819e77

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_i386.deb
Size/MD5 checksum: 1794446 45b8d5185af57d225dfc11f00a29d5c8
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_i386.deb
Size/MD5 checksum: 6974340 5207734dfd742e027042a54c319272cc
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_i386.deb
Size/MD5 checksum: 25369932 6ed97d08ede8b55091e283f28dcdac2c
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_i386.deb
Size/MD5 checksum: 48428 edd5742646f29e51fcd12b5338daaad4
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_i386.deb
Size/MD5 checksum: 7194866 2547f45553ed1e039c467893b6ce10de

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_ia64.deb
Size/MD5 checksum: 30404436 219e25b2ba8b1366e01dfaf3031f9e96
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_ia64.deb
Size/MD5 checksum: 10342956 0ffe68b9ba56ca766c123beaeff77fef
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_ia64.deb
Size/MD5 checksum: 2115944 16a9e8364b4fb289a4899be8d183993a
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_ia64.deb
Size/MD5 checksum: 48374 0eb939131872361ff04780f636737687
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_ia64.deb
Size/MD5 checksum: 9739652 ac79de3f43873ecb69c966b66beca3f1

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_mipsel.deb
Size/MD5 checksum: 1790138 294ac902b2dea86df6d24e602084964d
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_mipsel.deb
Size/MD5 checksum: 7563528 734d80a47d138cd3ff9cb24593e1313b
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_mipsel.deb
Size/MD5 checksum: 48378 90502bfe50ffef3ea1e7d70b741ac657
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_mipsel.deb
Size/MD5 checksum: 25848476 f96b6b16c3cb3af6ead2ff16a05c9023
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_mipsel.deb
Size/MD5 checksum: 7642696 82920ba66b11de45c84a75d090fb22e9

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_powerpc.deb
Size/MD5 checksum: 1833106 132dfeef44693f92d36b2051f5791d4f
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_powerpc.deb
Size/MD5 checksum: 26169892 28732b89362d6101d176cefc10c29789
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_powerpc.deb
Size/MD5 checksum: 7513800 eb88731a88e1d4fbcef8cae2ab55f761
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_powerpc.deb
Size/MD5 checksum: 7575374 202cf90ca790e38d8ed2751e2fc4de1d
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_powerpc.deb
Size/MD5 checksum: 48370 0de03d296210eb02dc71154d99a151da

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_s390.deb
Size/MD5 checksum: 26766454 8456de04aab0751e04d972165b10c526
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_s390.deb
Size/MD5 checksum: 7415102 215aad68cadff5a34e94f8d5b66dc049
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_s390.deb
Size/MD5 checksum: 1952590 21551cd175cef4cb7997e36e84f9ae47
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_s390.deb
Size/MD5 checksum: 48370 450746f7967c185821d07c79017205c4
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_s390.deb
Size/MD5 checksum: 7508160 aa838310e8ce8feb2edf94c986ebe207

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch10_sparc.deb
Size/MD5 checksum: 25427664 882974f600f36ec287fe9211507f8f91
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch10_sparc.deb
Size/MD5 checksum: 7153920 1bb209b696b198d154d36096973a0f57
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch10_sparc.deb
Size/MD5 checksum: 7015286 654054bc87b497b9e689b83fed51f118
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch10_sparc.deb
Size/MD5 checksum: 1798310 314ede7af23cfedf39c278a7285cfd1a
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch10_sparc.deb
Size/MD5 checksum: 48372 fd8fe1ce0cc9fc0cfc21e98126f0bc50

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.51a-24+lenny1.diff.gz
Size/MD5 checksum: 341231 17ef8e070991c21b4a8ed27683e190ab
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.51a-24+lenny1.dsc
Size/MD5 checksum: 1737 c66237a031cd9146316741285bca9766
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.51a.orig.tar.gz
Size/MD5 checksum: 17946664 6fae978908ad5eb790fa3f24f16dadba

Architecture independent packages:

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.51a-24+lenny1_all.deb
Size/MD5 checksum: 54928 72442ba1cbd461b620193c9f12a4c1b1
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.51a-24+lenny1_all.deb
Size/MD5 checksum: 60526 af7672b88c91abc7ad32eeb5aba5d899
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.51a-24+lenny1_all.deb
Size/MD5 checksum: 52734 4b515755a8060b9c55847ac89d64dea2

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_alpha.deb
Size/MD5 checksum: 2017610 d7d73b71bde514bcddcc34ccb98179a3
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_alpha.deb
Size/MD5 checksum: 9078508 052950781ae733b36d98778892be6996
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_alpha.deb
Size/MD5 checksum: 28328874 0566b66e57a95d4a407f930624c4f62f
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_alpha.deb
Size/MD5 checksum: 8921072 6b4a65792a3e4a3a7898effdf3a88c1e

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_amd64.deb
Size/MD5 checksum: 1905378 628959b2db2c6d53a946d95e1dcc6e05
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_amd64.deb
Size/MD5 checksum: 7586410 91c0bd72028fcfada249b84efc33416a
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_amd64.deb
Size/MD5 checksum: 8207538 3aed01edd6bb309d65ae6b19309a1231
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_amd64.deb
Size/MD5 checksum: 27157092 e48e558c67d6b9321e93a7fbe96f8138

arm architecture (ARM)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_arm.deb
Size/MD5 checksum: 7159776 4cbac4a908b11789c697a691e501d837
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_arm.deb
Size/MD5 checksum: 7606116 45c146f3a63b77c64e4d3fae1012eded
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_arm.deb
Size/MD5 checksum: 26204724 446b1ec40a6e7a0e8f44fd63ee5c953a
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_arm.deb
Size/MD5 checksum: 1782032 55d2b300101a8a2ceb864d11163dff15

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_armel.deb
Size/MD5 checksum: 1779400 db26dc5db3cfb011576e191836e80342
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_armel.deb
Size/MD5 checksum: 7643540 01d16c6012e91fc2721cc56b01ae1e82
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_armel.deb
Size/MD5 checksum: 7250024 33dc67f1bbb58ee3b7976816b1a406c3
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_armel.deb
Size/MD5 checksum: 26214014 39846ba81302b2a50fdaafea01fcc980

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_hppa.deb
Size/MD5 checksum: 8167608 e3457b456652a8242cea25e194e68ea9
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_hppa.deb
Size/MD5 checksum: 1959000 6a9e206daa9ff3c6420d795eb6217eaa
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_hppa.deb
Size/MD5 checksum: 8429344 f0050bae59f71b8a8b36928e769e2e68
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_hppa.deb
Size/MD5 checksum: 27885032 bdf724ed1a3ae1e31d677b57daee4615

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_i386.deb
Size/MD5 checksum: 7777192 8ef21b2713791403c9fde6e8e7cc6f09
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_i386.deb
Size/MD5 checksum: 26677468 b3865ed165188cd9cd469d52673e5ba4
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_i386.deb
Size/MD5 checksum: 1859970 4eb77733e322db626fc1953e3ce0edab
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_i386.deb
Size/MD5 checksum: 7197680 837eca5096e8288af8d7c87b1b2fc58b

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_ia64.deb
Size/MD5 checksum: 10914682 0f8c038e2bab8117a925f069b79b8b5f
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_ia64.deb
Size/MD5 checksum: 9933502 e6cb7e17cccb8fc46ec3f26279b7bd0b
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_ia64.deb
Size/MD5 checksum: 2186212 683687adae52d9c99743301959013f33
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_ia64.deb
Size/MD5 checksum: 31431258 3efd2ebba07a5dd225ce1725b7764c74

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_mips.deb
Size/MD5 checksum: 7838688 1fa47b0be2efa781d4baae56c949b4c1
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_mips.deb
Size/MD5 checksum: 1856112 b1329d54eb00d8fdcf688fae1e1ab1d5
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_mips.deb
Size/MD5 checksum: 26823126 b6788cc88c8a9ed89a84852cab1f8b78
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_mips.deb
Size/MD5 checksum: 7883724 075f6210bccdfde11084dcd6c38807db

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_mipsel.deb
Size/MD5 checksum: 7720858 23e3c02af493edd6d6493af4bc7250c5
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_mipsel.deb
Size/MD5 checksum: 1809730 9a376aaa0289b086086cae0f2cd38b36
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_mipsel.deb
Size/MD5 checksum: 7775746 6ff81d634ba56f85d5fefeb206d956cb
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_mipsel.deb
Size/MD5 checksum: 26342464 4f7d37a666c016c6ee1b4201452ce2f8

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_powerpc.deb
Size/MD5 checksum: 1916268 0bc2ea2ef11e0643ddf1ff7baf2771d2
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_powerpc.deb
Size/MD5 checksum: 27153952 79af13c7ae97a1846cf47426add5db23
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_powerpc.deb
Size/MD5 checksum: 8152750 7eff89cf9541ba3e28a5bcf6ffef3668
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_powerpc.deb
Size/MD5 checksum: 7605402 395f7e23a4b9cb8511a0d19d8e1cce16

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_s390.deb
Size/MD5 checksum: 7697458 ccfcfe29bcd5184f41f430b699dba62c
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_s390.deb
Size/MD5 checksum: 8226830 5cece6a80b492a781aadda362f58a730
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_s390.deb
Size/MD5 checksum: 28100750 4e83a4204f2e2ac7695a128695594df9
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_s390.deb
Size/MD5 checksum: 2031088 587d640431b7c9bb638d95cab27c1e8c

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.51a-24+lenny1_sparc.deb
Size/MD5 checksum: 26831224 a298056134e8022219a0239b011e2833
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.51a-24+lenny1_sparc.deb
Size/MD5 checksum: 7760640 d1e516164a185b5c8135f98bf72a2a5b
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.51a-24+lenny1_sparc.deb
Size/MD5 checksum: 1871516 877fa6da1c09343d77408a34cfec3929
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.51a-24+lenny1_sparc.deb
Size/MD5 checksum: 7142942 cc29b305dd77e60f9b37da6a96c1028d


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJ+AgWU5XKDemr/NIRAuSCAKDAqKw0Y1bSMyJ1q1zzz0v1ueeaHQCgveg7
W9xYzhLiAb6LLByKC/46Xas=
=go15
-----END PGP SIGNATURE-----
"

DSA 1780-1: New libdbd-pg-perl packages fix potential code execution  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1780-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
April 28, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : libdbd-pg-perl
Vulnerability : several
Problem type : local (remote)
Debian-specific: no
CVE Id(s) : CVE-2009-0663 CVE-2009-134

Two vulnerabilities have been discovered in libdbd-pg-perl, the DBI
driver module for PostgreSQL database access (DBD::Pg).

CVE-2009-0663

A heap-based buffer overflow may allow attackers to execute arbitrary
code through applications which read rows from the database using the
pg_getline and getline functions. (More common retrieval methods,
such as selectall_arrayref and fetchrow_array, are not affected.)

CVE-2009-1341

A memory leak in the routine which unquotes BYTEA values returned from
the database allows attackers to cause a denial of service.

For the old stable distribution (etch), these problems have been fixed
in version 1.49-2+etch1.

For the stable distribution (lenny) and the unstable distribution (sid),
these problems have been fixed in version 2.1.3-1 before the release of
lenny.

We recommend that you upgrade your libdbd-pg-perl package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49.orig.tar.gz
Size/MD5 checksum: 147310 76b9d6a2f4cbaefcba23380f83998215
http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz
Size/MD5 checksum: 7869 56a99e2007bf916001c3f25e666b5eb1
http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.dsc
Size/MD5 checksum: 1137 27572a9adacd09243cbc9a6cbd8b32cf

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_amd64.deb
Size/MD5 checksum: 131228 f4c6b39a15df7b264e4fec6c84348a00

arm architecture (ARM)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_arm.deb
Size/MD5 checksum: 125596 071c0261e3c53c0c58d7c49deda91c4d

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_hppa.deb
Size/MD5 checksum: 136324 c523cf9f116595cf92087694018eeaeb

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_i386.deb
Size/MD5 checksum: 128756 99639a5e94713216d7ab656569c3a1d9

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_ia64.deb
Size/MD5 checksum: 155694 5cc52a6a7a2f20659a7c1a0a2202b4c9

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_mips.deb
Size/MD5 checksum: 116780 da0d63d78a9b71edf49a49d9ca931887

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_mipsel.deb
Size/MD5 checksum: 116568 e23a1521db5192b9029d67c8f05bfd8f

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_powerpc.deb
Size/MD5 checksum: 131058 2dfd7e0569b0b712dcdc195788a86c9b

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_s390.deb
Size/MD5 checksum: 123850 a42d01e742d27217d859c883c2a38ef1

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1_sparc.deb
Size/MD5 checksum: 129566 f4194cffcb723109eea117e1397d1e43


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJ90xuAAoJEL97/wQC1SS+998H/iLRTM3LBQCpnwxW2rAqrGGT
JFc+N3rKsaKeTcVVqbbIKh51blB936ab/kTU94U1gSrb6+k1zZakez4XGk19tEAL
0F3GoUh8MVbIOsLYHx831QJY2yVtCVP2xpGdS8wDrm4Rn9agrYUkANyIBS+RoeZS
zWgtytJ3VofL4iRocX+h9gRu45Hz/7vEDMOzRNIdRxbXqRqc8la7inCjkieh2yIj
zjjRJa5lLTuLXGlVTbbpXnnzVKnCaRwEslnJ70Z4Ewlut6rEzqBfgeVihPvILE3f
C9vrBnxPnjl8Bw4s2/82ShFA2P3q7Jv1f2XuMeCgglAIVPXJp3p7EgTkAwSDwB0=
=pkG8
-----END PGP SIGNATURE-----
"