Debian Security Advisory DSA 426-1 | security@debian.org |
http://www.debian.org/security/ | Matt Zimmerman |
January 18th, 2004 | http://www.debian.org/security/faq |
Package | : | netpbm-free |
Vulnerability | : | insecure temporary files |
Problem-Type | : | local |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-0924 |
netpbm is graphics conversion toolkit made up of a large number
of single-purpose programs. Many of these programs were found to
create temporary files in an insecure manner, which could allow a
local attacker to overwrite files with the privileges of the user
invoking a vulnerable netpbm tool.
For the current stable distribution (woody) these problems have
been fixed in version 2:9.20-8.4.
For the unstable distribution (sid) these problems have been
fixed in version 2:9.25-9.
We recommend that you update your netpbm-free package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_9.20-8.4.dsc
Size/MD5 checksum: 662 2074eb1d13fa871111ec06f18ff57725
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_9.20-8.4.diff.gz
Size/MD5 checksum: 52834 0b7fbdc2e47c9a2a2e8da7eb54b98bb6
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_9.20.orig.tar.gz
Size/MD5 checksum: 1882851 0f153116c21bc7d2e167e574a486c22f
Alpha architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_alpha.deb
Size/MD5 checksum: 77762 1b6724adf13a90cf981122831e20165c
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_alpha.deb
Size/MD5 checksum: 135466 ed7e2fb447336275d65c0e984553ac9e
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_alpha.deb
Size/MD5 checksum: 1413784 feca605bc7f99fe0b7eb1fe5ae6e4e10
ARM architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_arm.deb
Size/MD5 checksum: 64148 b8151d91f4b6461d61aff5ca93186356
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_arm.deb
Size/MD5 checksum: 125526 5ad7c026d001b8033f7249fb59574f5e
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_arm.deb
Size/MD5 checksum: 1127644 e014fc4f87defe6d845288dc19a7f9dc
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_i386.deb
Size/MD5 checksum: 62450 6f7e06e132e08cabfd629d0cb89c7d98
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_i386.deb
Size/MD5 checksum: 103436 2c5d4e71e3de9bc55303d81a842c97f6
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_i386.deb
Size/MD5 checksum: 1079210 794d6f39a9f8cb427f1ca2569f1b10ec
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_ia64.deb
Size/MD5 checksum: 96534 8b8a73f914ec44486e23139547bc5c87
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_ia64.deb
Size/MD5 checksum: 170446 39927dc25960cb6db29a1ebe7d09436a
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_ia64.deb
Size/MD5 checksum: 1608638 6585784653a932078ba3354844e13fa7
HP Precision architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.3_hppa.deb
Size/MD5 checksum: 83914 666e951ffedd72f5d2a4e6abe379f94d
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.3_hppa.deb
Size/MD5 checksum: 122954 bc35c5b3ca865b04c94b805ef3947b75
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.3_hppa.deb
Size/MD5 checksum: 1337394 248f5113d06737cb2d35c889fb26a95a
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_m68k.deb
Size/MD5 checksum: 62048 60f5dfaf168d9a8ed74194ffa3a4e299
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_m68k.deb
Size/MD5 checksum: 102256 909a64f8620188f4bb17fb84613f3f60
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_m68k.deb
Size/MD5 checksum: 1016512 5caf53f54597bf2944ed798a4fe6c299
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_mips.deb
Size/MD5 checksum: 66904 342b1aa43a2a9a5737d86d44a64a6025
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_mips.deb
Size/MD5 checksum: 123508 fbfa242ebee248d72f5f95874836fde4
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_mips.deb
Size/MD5 checksum: 1181146 4fdf19eedaf2e2dd070bd20524a68005
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.3_mipsel.deb
Size/MD5 checksum: 66740 b7552fba3606a3f58ebb452abf7f0fea
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.3_mipsel.deb
Size/MD5 checksum: 123598 438cdf503b994fd3540f127ac1d31293
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.3_mipsel.deb
Size/MD5 checksum: 1179992 e064c0325d910621134cc151c6f0b420
PowerPC architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_powerpc.deb
Size/MD5 checksum: 68940 aad85d5f1b3d9e959ceb11ce78d9a3b7
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_powerpc.deb
Size/MD5 checksum: 117868 f90c3780160363d358b072e458ec419e
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_powerpc.deb
Size/MD5 checksum: 1153728 37e3b1719ed32004377410bfc49a82c5
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_s390.deb
Size/MD5 checksum: 66696 6d600c371a05c4689b7f45d3800d70dc
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_s390.deb
Size/MD5 checksum: 116054 86fdf11619f0411cc4eac144d51556ce
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_s390.deb
Size/MD5 checksum: 1130276 b4d038d29e5c674d034bda4f989d976f
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_9.20-8.4_sparc.deb
Size/MD5 checksum: 65304 7a162f5688e187d6dd8f179a1a1bf7aa
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_9.20-8.4_sparc.deb
Size/MD5 checksum: 118610 148bb94f30313a348ba2c7570734d4e3
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_9.20-8.4_sparc.deb
Size/MD5 checksum: 1435468 69ab0007d50cf12a59de32d29e5e5f8b
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 425-1 | security@debian.org |
http://www.debian.org/security/ | Matt Zimmerman |
January 16th, 2004 | http://www.debian.org/security/faq |
Package | : | tcpdump |
Vulnerability | : | multiple vulnerabilities |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-1029 CAN-2003-0989 CAN-2004-0055 CAN-2004-0057 |
Multiple vulnerabilities were discovered in tcpdump, a tool for
inspecting network traffic. If a vulnerable version of tcpdump
attempted to examine a maliciously constructed packet, a number of
buffer overflows could be exploited to crash tcpdump, or
potentially execute arbitrary code with the privileges of the
tcpdump process.
CAN-2003-1029 – infinite loop and memory consumption in
processing L2TP packets
CAN-2003-0989, CAN-2004-0057 – infinite loops in processing
ISAKMP packets.
CAN-2004-0055 – segmentation fault caused by a RADIUS attribute
with a large length value
For the current stable distribution (woody) these problems have
been fixed in version 3.6.2-2.7.
For the unstable distribution (sid) these problems will be fixed
soon.
We recommend that you update your tcpdump package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7.dsc
Size/MD5 checksum: 587 fc666bc6c77312ce601782871bde22a1
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7.diff.gz
Size/MD5 checksum: 12091 8453e6103104e509ab52adb0ed1bbd37
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2.orig.tar.gz
Size/MD5 checksum: 380635 6bc8da35f9eed4e675bfdf04ce312248
Alpha architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_alpha.deb
Size/MD5 checksum: 214088 90f363cde67deec9e56bf827bf1f9e8e
ARM architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_arm.deb
Size/MD5 checksum: 180028 e0fb2e07c499544aafbec0bbf1f853c8
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_i386.deb
Size/MD5 checksum: 169896 d6e159ea45a8663a31bdcbecc83ac3fa
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_ia64.deb
Size/MD5 checksum: 247376 34ca33e36d7c85c8401e1fc04ae0b295
HP Precision architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_hppa.deb
Size/MD5 checksum: 196120 1edd4cc6f1a5ec98aa3210893b26870b
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_m68k.deb
Size/MD5 checksum: 157854 b798473fd9ec1d4c1d0ca1d34450e061
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_mips.deb
Size/MD5 checksum: 189302 bc5fc61607359b857996af3b7cd1759f
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.4_mipsel.deb
Size/MD5 checksum: 193268 961b6b8d7e70ae97722759b8049445b1
PowerPC architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_powerpc.deb
Size/MD5 checksum: 177184 8ac3abd34f1131c0cd2fadc21b92deae
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_s390.deb
Size/MD5 checksum: 174738 533d1cea1cb982cf252900ee8f2d0604
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_sparc.deb
Size/MD5 checksum: 179666 a4e039dc8f12be45b144bd731e1d713c
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 424-1 | security@debian.org |
http://www.debian.org/security/ | Matt Zimmerman |
January 16th, 2004 | http://www.debian.org/security/faq |
Package | : | mc |
Vulnerability | : | buffer overflow |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-1023 |
A vulnerability was discovered in Midnight Commander, a file
manager, whereby a malicious archive (such as a .tar file) could
cause arbitrary code to be executed if opened by Midnight
Commander.
For the current stable distribution (woody) this problem has
been fixed in version 4.5.55-1.2woody2.
For the unstable distribution (sid) this problem has been fixed
in version 1:4.6.0-4.6.1-pre1-1.
We recommend that you update your mc package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.dsc
Size/MD5 checksum: 797 0d6f8c733c81707b6da81e27f877b271
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.diff.gz
Size/MD5 checksum: 33293 ce42d50c572b58ac0abd28e0dd9cc076
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz
Size/MD5 checksum: 4850321 82772e729bb2ecfe486a6c219ebab09f
Alpha architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_alpha.deb
Size/MD5 checksum: 1182848 57163da15f3055e26800903e6418d8a7
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_alpha.deb
Size/MD5 checksum: 560976 98e635c74d4fc62e36ed70a443496081
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_alpha.deb
Size/MD5 checksum: 1350990 2695fce52f1289067b590405c321715c
ARM architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_arm.deb
Size/MD5 checksum: 1024972 a76436b6216f272e65a44cab92107924
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_arm.deb
Size/MD5 checksum: 478210 beedf3b65a86a09f86b954a6a2aff08a
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_arm.deb
Size/MD5 checksum: 1351086 0b7b4ff418f8c15d185b1881ee2e74f0
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_i386.deb
Size/MD5 checksum: 992058 10fe505f8cd59699485bb156a2139913
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_i386.deb
Size/MD5 checksum: 453560 8c45b201009d084f2aeb850190446ad8
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_i386.deb
Size/MD5 checksum: 1351046 637e5c75a130c7813e4b3d71be82acfe
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_ia64.deb
Size/MD5 checksum: 1431172 fcc33e82760761298baab4a89b273de5
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_ia64.deb
Size/MD5 checksum: 686630 3015bc29165e1caf53bf7f21c2b1d518
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_ia64.deb
Size/MD5 checksum: 1350982 1a68362464c0a7f1b55f68b8db7c0974
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_hppa.deb
Size/MD5 checksum: 1142252 d3d9e252387aad10007e1ac4d0393d49
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_hppa.deb
Size/MD5 checksum: 539770 1b4e84762374c4710d0a73f14e217f99
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_hppa.deb
Size/MD5 checksum: 1351372 e010eb84f208b214f22052fac962349a
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_m68k.deb
Size/MD5 checksum: 955782 b312e654b1ba0749f91ad0c3b723ae50
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_m68k.deb
Size/MD5 checksum: 435060 b5098beeda86041faef3c6583f1ca6df
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_m68k.deb
Size/MD5 checksum: 1351548 1956ac76843514bb1abba1898858f111
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_mips.deb
Size/MD5 checksum: 1084440 3d701c5d31b012367da43bbdaabf9ed5
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_mips.deb
Size/MD5 checksum: 535016 c947de9db4504246e9b1421767f836cc
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_mips.deb
Size/MD5 checksum: 1351494 cf4575860b110ac5569768eed69ed719
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_powerpc.deb
Size/MD5 checksum: 1040834 5d956b0ce80752e94933d1cb4c177776
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_powerpc.deb
Size/MD5 checksum: 487920 5d880a8a277c1b09c155d8d071eb9323
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_powerpc.deb
Size/MD5 checksum: 1351364 1c064a34bc35ec729115415e90271c9e
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_s390.deb
Size/MD5 checksum: 1027180 95e3a56c659d307e83945269ca9450b9
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_s390.deb
Size/MD5 checksum: 477210 d69d94302880a813ac01174800d0cc0b
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_s390.deb
Size/MD5 checksum: 1351330 b7aef4036f698cbebd5ab98a57e639d8
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_sparc.deb
Size/MD5 checksum: 1026474 75a6e4b36b432db5b49f6fc4784d8a79
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_sparc.deb
Size/MD5 checksum: 481556 df562844379347c39d555ffba05fd185
http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_sparc.deb
Size/MD5 checksum: 1351324 8b95d4afa916dda9f17c595e6422363f
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 427-1 | security@debian.org |
http://www.debian.org/security/ | Martin Schulze |
January 19th, 2004 | http://www.debian.org/security/faq |
Package | : | kernel-patch-2.4.17-mips |
Vulnerability | : | mising boundary check |
Problem-Type | : | local |
Debian-specific | : | no |
CVE ID | : | CAN-2003-0985 |
Paul Starzetz discovered a flaw in bounds checking in mremap()
in the Linux kernel (present in version 2.4.x and 2.6.x) which may
allow a local attacker to gain root privileges. Version 2.2 is not
affected by this bug.
For the stable distribution (woody) this problem has been fixed
in version 2.4.17-0.020226.2.woody3 the mips and mipsel
architectures.
For the unstable distribution (sid) this problem will be fixed
soon with newly uploaded packages.
We recommend that you upgrade your kernel packages. This problem
has been fixed in the upstream version 2.4.24 as well.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
Size/MD5 checksum: 786 0ed0c82eae3f9bdea8b5643080f11231
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody3.tar.gz
Size/MD5 checksum: 1136013 b115834700679688144a44ba55554389
Architecture independent components:
Size/MD5 checksum: 1138232 067fa128b07595b293b69c77093c1ceb
Big endian MIPS architecture:
Size/MD5 checksum: 3475612 d5ad56a3ed70e47a8da77a82e2736c82
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody3_mips.deb
Size/MD5 checksum: 2042408 9595b0545e466f8329b6c41df35bd817
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody3_mips.deb
Size/MD5 checksum: 2042232 70e9777c256a8cf0d0682bcc442467eb
Little endian MIPS architecture:
Size/MD5 checksum: 3474458 5cf03484bfbd5f6c9ea7fa44c87b5e41
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody3_mipsel.deb
Size/MD5 checksum: 2196262 6456cdf36e393a624f6155fb229d0364
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody3_mipsel.deb
Size/MD5 checksum: 2192656 96c8ca1f1a6b7e30ca7b114c075823c8
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody3_mipsel.deb
Size/MD5 checksum: 14928 30ee08d500482dbdea402ef23a52ca6c
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>