---

Debian GNU/Linux Advisories: imagemagick, kernel-source-2.4.17, kernel-patch-2.4.17-mips


Debian Security Advisory DSA 331-1 [email protected]
http://www.debian.org/security/ Matt Zimmerman
June 27th, 2003 http://www.debian.org/security/faq

Package : imagemagick
Vulnerability : insecure temporary file
Problem-Type : local
Debian-specific : no
CVE Ids : CAN-2003-0455

imagemagick’s libmagick library, under certain circumstances,
creates temporary files without taking appropriate security
precautions. This vulnerability could be exploited by a local user
to create or overwrite files with the privileges of another user
who is invoking a program using this library.

For the stable distribution (woody) this problem has been fixed
in version 4:5.4.4.5-1woody1.

For the unstable distribution (sid) this problem has been fixed
in version 4:5.5.7-1.

We recommend that you update your imagemagick package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1.dsc

Size/MD5 checksum: 852 d5287cb8bb5ebea7feb163dce7eb8745

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1.diff.gz

Size/MD5 checksum: 13713 97639f0bf3a5b64cdb64be4cad800b22

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5.orig.tar.gz

Size/MD5 checksum: 3901237 f35e356b4ac1ebc58e3cffa7ea7abc07

Alpha architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_alpha.deb

Size/MD5 checksum: 1309154 d10139392bc5d82619c80c91e9877e78

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_alpha.deb

Size/MD5 checksum: 153872 54e5bef7b11b49db821d848dd1cdb46b

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_alpha.deb

Size/MD5 checksum: 55832 04c80b948497f84d9a8986a9129e0a1a

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_alpha.deb

Size/MD5 checksum: 831150 02277cf6f610d47bc6b407891206a75c

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_alpha.deb

Size/MD5 checksum: 66896 33e498a7e3feb84ae35c1fd8dcd6435e

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_alpha.deb

Size/MD5 checksum: 113414 4bf9c2bbdd47c137c92e86f8e778c623

ARM architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_arm.deb

Size/MD5 checksum: 1296660 9e0819548f01c7423730043c37283fec

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_arm.deb

Size/MD5 checksum: 118278 e1b9d0198d61f6eb354f61f508d50220

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_arm.deb

Size/MD5 checksum: 55870 9193725a617bd076e34678e8dc7870bb

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_arm.deb

Size/MD5 checksum: 896558 2fbd372591d2b262c506ccdf6279dc13

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_arm.deb

Size/MD5 checksum: 66928 54c4c1a1ea835fb28fc2bfdfac6fdd5c

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_arm.deb

Size/MD5 checksum: 109542 241c0e1f3aa2014479591e7c90cc3e3e

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_i386.deb

Size/MD5 checksum: 1294636 6ebfed48af04904c53cb3b167d35f8c9

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_i386.deb

Size/MD5 checksum: 122406 a2a44e6b90b4661cbdce947dbb5cea6d

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_i386.deb

Size/MD5 checksum: 55866 73beac80a24ce0f7ad7a8b00c3d23360

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_i386.deb

Size/MD5 checksum: 769968 0999159912077ffa4e6e9b1a813d06f9
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_i386.deb

Size/MD5 checksum: 66918 68190ab0bd2c82b347e250c39580e810

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_i386.deb

Size/MD5 checksum: 106550 da18e85a4ab5120c0e6a14a900628ce5

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_ia64.deb

Size/MD5 checksum: 1335610 9836eb7439f6b806a4c06f314922d03a

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_ia64.deb

Size/MD5 checksum: 136736 3b5d3b07566eebebed117e27d6c70880

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_ia64.deb

Size/MD5 checksum: 55826 7b1ae8505a7b66b917a705abddbb8337

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_ia64.deb

Size/MD5 checksum: 1354912 9f7cb7031b17c60110b6b807c4976c65

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_ia64.deb

Size/MD5 checksum: 66888 915675cc1be6c2ec1aa1c2317f287ab0

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_ia64.deb

Size/MD5 checksum: 132546 8e91d9b19ea31dfc5ab8082bf4d424c2

HP Precision architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_hppa.deb

Size/MD5 checksum: 1296918 8ecf64e7738980aa040e5e03a2ee640b

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_hppa.deb

Size/MD5 checksum: 132462 8cf94dbb086206f9ee00fe777f550357

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_hppa.deb

Size/MD5 checksum: 55864 d2bc8567aa8d2d412a16d7d123c9eb11

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_hppa.deb

Size/MD5 checksum: 857142 4effa98d340a4adc3e01e08693f0f9c0

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_hppa.deb

Size/MD5 checksum: 66920 4235b8e124f8872d4aa0716031ba16e0

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_hppa.deb

Size/MD5 checksum: 116788 0ad5543d824d37dd507e496816a6a996

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_m68k.deb

Size/MD5 checksum: 1291910 0f79f1b5c834119c55cafdf370b6dd2e

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_m68k.deb

Size/MD5 checksum: 133604 6b949f8416e73e015ce3e8c55eb88871

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_m68k.deb

Size/MD5 checksum: 55880 ff697d65ba7893023f69334b3aa14dec

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_m68k.deb

Size/MD5 checksum: 750226 7760eeacbf881fd994e37c2bc824f8c0

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_m68k.deb

Size/MD5 checksum: 66958 2cbf7b99d2da0b88994776aa91552e20

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_m68k.deb

Size/MD5 checksum: 107050 5a895603cb4a0e48e7271a302cad7cee

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_mips.deb

Size/MD5 checksum: 1294384 4fe7c423a428d9879590b0a15debfd24

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_mips.deb

Size/MD5 checksum: 119758 5c13b74e3fbb360822a23dce0c739bca

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_mips.deb

Size/MD5 checksum: 55882 671f295f4f2f98e998c8a8c0bd70ccbb

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_mips.deb

Size/MD5 checksum: 730286 f091d817357ec3c6a0c4c1e4d4f80b7b

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_mips.deb

Size/MD5 checksum: 66932 139499cceccb1a43665a8fa7e451774e

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_mips.deb

Size/MD5 checksum: 102960 2c9659cc2cb80059344a5daf30042c81

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_mipsel.deb

Size/MD5 checksum: 1294254 56f9a24d4ca3f5085c4764fff7e26643

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_mipsel.deb

Size/MD5 checksum: 113250 347dd47ba9f259320fbd9694c59f7643

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_mipsel.deb

Size/MD5 checksum: 55870 85567e1aae400036fc37be9c58d18ec4

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_mipsel.deb

Size/MD5 checksum: 718640 79af8a4685086c782b0b55aff35c7e01

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_mipsel.deb

Size/MD5 checksum: 66934 be08669429d5efc1f6a408b0d5cc9aec

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_mipsel.deb

Size/MD5 checksum: 102492 758c8d725f91c2b966cbe648315b1982

PowerPC architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_powerpc.deb

Size/MD5 checksum: 1290880 e56a6fcbc1b06d63f0d8624a6c14ff55

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_powerpc.deb

Size/MD5 checksum: 135542 637e7a4decebc592c4392c5d28fedcfb

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_powerpc.deb

Size/MD5 checksum: 55868 7adc59ccb76521f5f257cf2a400b9fcc

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_powerpc.deb

Size/MD5 checksum: 783718 b15259a4f6352b42adc1f2ceeff4c3b2

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_powerpc.deb

Size/MD5 checksum: 66920 87b669690d7d5cc503e94d159936cafb

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_powerpc.deb

Size/MD5 checksum: 111546 8ce272013a9dc7a7d1ba21bde37224ed

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_s390.deb

Size/MD5 checksum: 1291660 5eb4312df52449e33801d22fe79ae8b9

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_s390.deb

Size/MD5 checksum: 131618 138ec629de5947a631d96e36fdd20925

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_s390.deb

Size/MD5 checksum: 55858 e01a9940a1c4013ef863e5824b62775b

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_s390.deb

Size/MD5 checksum: 775122 c24c8778527e89485f8c1615a90b2cc0

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_s390.deb

Size/MD5 checksum: 66910 278a7bc2cfa9c0df57583906f60a23e5

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_s390.deb

Size/MD5 checksum: 108586 3a65d9b73cf2894b21263fd11b1ca598

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody1_sparc.deb

Size/MD5 checksum: 1294684 7b6da4b91f91e09fea287d613548c870

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody1_sparc.deb

Size/MD5 checksum: 123462 4be81cc71d4da063f45ef86bf1e8c0be

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody1_sparc.deb

Size/MD5 checksum: 55856 693ab80759b91751f1d39a42297428d3

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody1_sparc.deb

Size/MD5 checksum: 800230 6c36c10ef707cb6783fae7999b8f8786

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody1_sparc.deb

Size/MD5 checksum: 66926 95b5886aef2a301c2bb4aecffbb7c116

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody1_sparc.deb

Size/MD5 checksum: 112502 72c181c78fa4b8b63f635612870e78ef

These files will probably be moved into the stable distribution
on its next revision.



Debian Security Advisory DSA 332-1 [email protected]
http://www.debian.org/security/ Matt Zimmerman
June 27th, 2003 http://www.debian.org/security/faq

Package : kernel-source-2.4.17, kernel-patch-2.4.17-mips
Vulnerability : several
Problem-Type : ocal, remote
Debian-specific : no
CVE Ids : CVE-2002-0429 CAN-2003-0001 CAN-2003-0127 CAN-2003-0244
CAN-2003-0246 CAN-2003-0247 CAN-2003-0248 CAN-2003-0364

A number of vulnerabilities have been discovered in the Linux
kernel.

  • – CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c
    for Linux kernels 2.4.18 and earlier on x86 systems allow local
    users to kill arbitrary processes via a a binary compatibility
    interface (lcall)
  • – CAN-2003-0001: Multiple ethernet Network Interface Card (NIC)
    device drivers do not pad frames with null bytes, which allows
    remote attackers to obtain information from previous packets or
    kernel memory by using malformed packets
  • – CAN-2003-0127: The kernel module loader allows local users to
    gain root privileges by using ptrace to attach to a child process
    that is spawned by the kernel
  • – CAN-2003-0244: The route cache implementation in Linux 2.4,
    and the Netfilter IP conntrack module, allows remote attackers to
    cause a denial of service (CPU consumption) via packets with forged
    source addresses that cause a large number of hash table collisions
    related to the PREROUTING chain
  • – CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20
    and earlier does not properly restrict privileges, which allows
    local users to gain read or write access to certain I/O ports.
  • – CAN-2003-0247: vulnerability in the TTY layer of the Linux
    kernel 2.4 allows attackers to cause a denial of service (“kernel
    oops”)
  • – CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows
    attackers to modify CPU state registers via a malformed
    address.
  • – CAN-2003-0364: The TCP/IP fragment reassembly handling in the
    Linux kernel 2.4 allows remote attackers to cause a denial of
    service (CPU consumption) via certain packets that cause a large
    number of hash table collisions

This advisory provides corrected source code for Linux 2.4.17,
and corrected binary kernel images for the mips and mipsel
architectures. Other versions and architectures will be covered by
separate advisories.

For the stable distribution (woody), these problems have been
fixed in kernel-source-2.4.17 version 2.4.17-1woody1 and
kernel-patch-2.4.17-mips version 2.4.17-0.020226.2.woody2.

For the unstable distribution (sid) these problems are fixed in
kernel-source-2.4.20 version 2.4.20-8.

We recommend that you update your kernel packages.

NOTE: A system reboot will be required immediately after the
upgrade in order to replace the running kernel. Remember to read
carefully and follow the instructions given during the kernel
upgrade process.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc

Size/MD5 checksum: 786 22545e621e57307760966baa10b841fc

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz

Size/MD5 checksum: 1146581 9f28eec81b8eb17d10b92655304ee892

Architecture independent components:


http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb

Size/MD5 checksum: 1148854 3b24c4ea5d2d64219de78708abe97457

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb

Size/MD5 checksum: 3475338 10faf449f8d96e17f6bf250b83de9b09

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb

Size/MD5 checksum: 2042164 5d9c3e556d4b25a3966bbd2e1b2db765

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb

Size/MD5 checksum: 2041978 02f5c02d1937ef5aed708e975e828b3f

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mipsel.deb

Size/MD5 checksum: 3474076 708d1aefc6b95869373cbd3beec2643d

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody2_mipsel.deb

Size/MD5 checksum: 2196544 42b2446e2c7b19cc3c5ddc674e3f7d06

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody2_mipsel.deb

Size/MD5 checksum: 2192732 c531b9515e1e7ac9b555a6ebc58fd172

http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody2_mipsel.deb

Size/MD5 checksum: 14884 341113e795e533fb6de04eb49ad17c97

Source archives:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1.dsc

Size/MD5 checksum: 690 4c2994b996abb2960711fe1e6e962712

http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1.diff.gz

Size/MD5 checksum: 38092 4cec4a35b4bbd27a9f54a6c9d9dc5019

http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17.orig.tar.gz

Size/MD5 checksum: 29445154 d5de2a4dc49e32c37e557ef856d5d132

Architecture independent components:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody1_all.deb

Size/MD5 checksum: 1719692 ec59d9331d0654a67859c40ab3abf260

http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1_all.deb

Size/MD5 checksum: 23878706 031649d73da791becf1c4f0c69d13ce1

Alpha architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_alpha.deb

Size/MD5 checksum: 16510 381f00dd2c315eb7926dd18a039a4d4a

ARM architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_arm.deb

Size/MD5 checksum: 15224 37d883ab4530e22b28b29c86ccbe4c0a

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_i386.deb

Size/MD5 checksum: 14876 46fa25b8cce097c219e16d96947abb7d

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_ia64.deb

Size/MD5 checksum: 18600 503f0919f883668553f8bd973c84eb98

HP Precision architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_hppa.deb

Size/MD5 checksum: 16216 90ba4a9476c5126fc581331866f59040

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_m68k.deb

Size/MD5 checksum: 14718 e316ab0b4c10c64f9644667c475c53ac

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_mips.deb

Size/MD5 checksum: 15884 3498ee16ddc2738919e244282087ab7f

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_mipsel.deb

Size/MD5 checksum: 15882 4feae5bd3f11ce0e326fa9f0dfb00c74

PowerPC architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_powerpc.deb

Size/MD5 checksum: 15618 44262ab37f81982802aeef31d9688d79

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_s390.deb

Size/MD5 checksum: 15750 54f39327009b585031595a8d89628bca

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_sparc.deb

Size/MD5 checksum: 17710 1967f9527247961f55e98d7d6edc4d86

These files will probably be moved into the stable distribution
on its next revision.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis