[Secure-testing-commits] r2006 - data/CAN data/DTSA data/DTSA/advs website website/DTSA

Joey Hess joeyh at costa.debian.org
Thu Sep 15 16:05:03 UTC 2005


Author: joeyh
Date: 2005-09-15 16:04:59 +0000 (Thu, 15 Sep 2005)
New Revision: 2006

Added:
   data/DTSA/advs/16-linux-2.6.adv
   website/DTSA/DTSA-16-1.html
Removed:
   data/DTSA/advs/nn-kernel-source-2.6.8.adv
Modified:
   data/CAN/list
   data/DTSA/list
   website/list.html
Log:
Put together an advisory for the linux-2.6 packages. This is not a normal
DTSA since the fix reached testing on its own steam; it seemed worth making
an announcement since users need to take special actions to install the new
linux-2.6 packages and upgrade.


Modified: data/CAN/list
===================================================================
--- data/CAN/list	2005-09-15 15:40:40 UTC (rev 2005)
+++ data/CAN/list	2005-09-15 16:04:59 UTC (rev 2006)
@@ -4493,6 +4493,7 @@
 CAN-2005-1763 (Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures ...)
 	- kernel-source-2.6.8 2.6.8-17
 	- kernel-source-2.6.8 2.6.8-16sarge1
+	TODO: check if it's fixed in linux-2.6
 CAN-2005-1762 (The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 ...)
 	- linux-2.6 2.6.12-1 (medium)
 	- kernel-source-2.6.8 2.6.8-17
@@ -7961,11 +7962,13 @@
 	- kernel-source-2.4.27 2.4.27-11
 	- kernel-source-2.6.8 2.6.8-17
 	- kernel-source-2.6.8 2.6.8-16sarge1
+	TODO: check if it's fixed in linux-2.6
 CAN-2005-0756 (ptrace 2.6.8.1 does not properly verify addresses on the amd64 ...)
 	- kernel-source-2.4.27 2.4.27-11 (medium)
 	- kernel-source-2.6.8 2.6.8-17 (medium)
 	- kernel-source-2.6.8 2.6.8-16sarge1 (medium)
 	- kernel-source-2.6.11 2.6.11-7 (medium)
+	TODO: check if it's fixed in linux-2.6
 CAN-2005-0755 (Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player ...)
 	- helix-player 1.0.4-1
 CAN-2005-0754 (Kommander in KDE 3.2 through KDE 3.4.0 executes data files without ...)
@@ -9380,6 +9383,7 @@
 	NOTE: According to Herbert Xu, 2.4 is not vulnerable : http://oss.sgi.com/archives/netdev/2005-01/msg01107.html
 	NOTE: Seems to be stuck with the ABI bump / debian-installer problem
 	- kernel-source-2.6.8 (unfixed; bug #295949; high)
+	TODO: verify if it's fixed in linux-2.6
 CAN-2005-0448 (Race condition in the rmtree function in File::Path.pm in Perl before ...)
 	{DSA-696-1}
 	- perl 5.8.4-7

Copied: data/DTSA/advs/16-linux-2.6.adv (from rev 1998, data/DTSA/advs/nn-kernel-source-2.6.8.adv)
===================================================================
--- data/DTSA/advs/nn-kernel-source-2.6.8.adv	2005-09-15 11:57:38 UTC (rev 1998)
+++ data/DTSA/advs/16-linux-2.6.adv	2005-09-15 16:04:59 UTC (rev 2006)
@@ -0,0 +1,120 @@
+source: linux-2.6
+date: September 15, 2005
+author: Joey Hess
+vuln-type: several holes
+problem-scope: remote
+debian-specifc: no
+cve: CAN-2005-2098 CAN-2005-2099 CAN-2005-2456 CAN-2005-2617 CAN-2005-1913 CAN-2005-1761 CAN-2005-2457 CAN-2005-2458 CAN-2005-2459 CAN-2005-2548 CAN-2004-2302 CAN-2005-1765 CAN-2005-1762 CAN-2005-1761 CAN-2005-2555
+testing-fix: 2.6.12-6
+sid-fix: 2.6.12-6
+upgrade: apt-get install linux-image-2.6-386; reboot
+
+Several security related problems have been found in version 2.6 of the
+linux kernel. The Common Vulnerabilities and Exposures project identifies
+the following problems:
+
+CAN-2004-2302
+
+  Race condition in the sysfs_read_file and sysfs_write_file functions in
+  Linux kernel before 2.6.10 allows local users to read kernel memory and
+  cause a denial of service (crash) via large offsets in sysfs files.
+
+CAN-2005-1761
+
+  Vulnerability in the Linux kernel allows local users to cause a
+  denial of service (kernel crash) via ptrace.
+
+CAN-2005-1762
+
+  The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64
+  platform allows local users to cause a denial of service (kernel crash) via
+  a "non-canonical" address.
+
+CAN-2005-1765
+
+  syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when
+  running in 32-bit compatibility mode, allows local users to cause a denial
+  of service (kernel hang) via crafted arguments.
+
+CAN-2005-1913
+
+  When a non group-leader thread called exec() to execute a different program
+  while an itimer was pending, the timer expiry would signal the old group
+  leader task, which did not exist any more. This caused a kernel panic.
+
+CAN-2005-2098 
+
+  The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before
+  2.6.12.5 contains an error path that does not properly release the session
+  management semaphore, which allows local users or remote attackers to cause
+  a denial of service (semaphore hang) via a new session keyring (1) with an
+  empty name string, (2) with a long name string, (3) with the key quota
+  reached, or (4) ENOMEM.
+
+CAN-2005-2099
+
+  The Linux kernel before 2.6.12.5 does not properly destroy a keyring that
+  is not instantiated properly, which allows local users or remote attackers
+  to cause a denial of service (kernel oops) via a keyring with a payload
+  that is not empty, which causes the creation to fail, leading to a null
+  dereference in the keyring destructor.
+
+CAN-2005-2456
+
+  Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c
+  in Linux kernel 2.6 allows local users to cause a denial of service (oops
+  or deadlock) and possibly execute arbitrary code via a p->dir value that is
+  larger than XFRM_POLICY_OUT, which is used as an index in the
+  sock->sk_policy array.
+
+CAN-2005-2457
+
+  The driver for compressed ISO file systems (zisofs) in the Linux kernel
+  before 2.6.12.5 allows local users and remote attackers to cause a denial
+  of service (kernel crash) via a crafted compressed ISO file system.
+
+CAN-2005-2458
+
+  inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows
+  remote attackers to cause a denial of service (kernel crash) via a
+  compressed file with "improper tables".
+
+CAN-2005-2459
+
+  The huft_build function in inflate.c in the zlib routines in the Linux
+  kernel before 2.6.12.5 returns the wrong value, which allows remote
+  attackers to cause a denial of service (kernel crash) via a certain
+  compressed file that leads to a null pointer dereference, a different
+  vulnerbility than CAN-2005-2458.
+
+CAN-2005-2548
+
+  vlan_dev.c in Linux kernel 2.6.8 allows remote attackers to cause a denial
+  of service (kernel oops from null dereference) via certain UDP packets that
+  lead to a function call with the wrong argument, as demonstrated using
+  snmpwalk on snmpd.
+
+CAN-2005-2555
+
+  Linux kernel 2.6.x does not properly restrict socket policy access to users
+  with the CAP_NET_ADMIN capability, which could allow local users to conduct
+  unauthorized activities via (1) ipv4/ip_sockglue.c and (2)
+  ipv6/ipv6_sockglue.c.
+
+CAN-2005-2617
+
+  The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12
+  and later, on the amd64 architecture, does not check the return value of
+  the insert_vm_struct function, which allows local users to trigger a memory
+  leak via a 32-bit application with crafted ELF headers.
+
+In addition this update fixes some security issues that have not been
+assigned CVE ids:
+
+  - Fix DST leak in icmp_push_reply().  Possible remote DoS?
+
+  - NPTL signal delivery deadlock fix; possible local DoS.
+  
+  - fix a memory leak in devices seq_file implementation; local DoS.
+
+  - Fix SKB leak in ip6_input_finish(); local DoS.

Deleted: data/DTSA/advs/nn-kernel-source-2.6.8.adv
===================================================================
--- data/DTSA/advs/nn-kernel-source-2.6.8.adv	2005-09-15 15:40:40 UTC (rev 2005)
+++ data/DTSA/advs/nn-kernel-source-2.6.8.adv	2005-09-15 16:04:59 UTC (rev 2006)
@@ -1,21 +0,0 @@
-source: kernel-source-2.6.8
-date: September 10, 2005
-author: Micah Anderson
-vuln-type: various
-problem-scope: remote
-debian-specifc: no
-cve: CAN-2005-1763, CAN-2005-1762, CAN-2005-0756, CAN-2005-1265, CAN-2005-0757,
-CAN-2005-1765, CAN-2005-1761, CAN-2005-2456, CAN-2005-2548, CAN-2004-2302,
-CAN-2005-1767, CAN-2005-2458, CAN-2005-2459
-vendor-advisory: 
-testing-fix: linux-2.6
-sid-fix: linux-2.6
-upgrade: apt-get install xxx
-
-xxx multiline description here
-
-TODO:
-        upgrade instructions
-        descriptions
-        what about security fixes that don't have CANs?
-

Modified: data/DTSA/list
===================================================================
--- data/DTSA/list	2005-09-15 15:40:40 UTC (rev 2005)
+++ data/DTSA/list	2005-09-15 16:04:59 UTC (rev 2006)
@@ -42,3 +42,6 @@
 [September 13th, 2005] DTSA-15-1 php4 - several vulnerabilities
 	{CAN-2005-1751 CAN-2005-1921 CAN-2005-2498 }
 	- php4 4:4.3.10-16etch1
+[September 15, 2005] DTSA-16-1 linux-2.6 - various
+	{CAN-2005-2098 CAN-2005-2099 CAN-2005-2456 CAN-2005-2617 CAN-2005-1913 CAN-2005-1761 CAN-2005-2457 CAN-2005-2458 CAN-2005-2459 CAN-2005-2548 CAN-2004-2302 CAN-2005-1765 CAN-2005-1762 CAN-2005-1761 CAN-2005-2555 }
+	- linux-2.6 2.6.12-6

Added: website/DTSA/DTSA-16-1.html
===================================================================
--- website/DTSA/DTSA-16-1.html	2005-09-15 15:40:40 UTC (rev 2005)
+++ website/DTSA/DTSA-16-1.html	2005-09-15 16:04:59 UTC (rev 2006)
@@ -0,0 +1,320 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+    <html><head><meta http-equiv="Content-Type" content="text/html; charset=iso8859-1">
+    <title>Debian testing security team - Advisory</title>
+    <link type="text/css" rel="stylesheet" href="../style.css">
+    <link rel="shortcut icon" href="http://www.debian.org/favicon.ico">
+    </head>
+    <body>
+    <div align="center">
+    <a href="http://www.debian.org/">
+
+     <img src="http://www.debian.org/logos/openlogo-nd-50.png" border="0" hspace="0" vspace="0" alt=""></a>
+    <a href="http://www.debian.org/">
+     <img src="http://www.debian.org/Pics/debian.png" border="0" hspace="0" vspace="0" alt="Debian Project"></a>
+    </div>
+    <br />
+    <table class="reddy" width="100%">
+    <tr>
+    <td class="reddy">
+    <img src="http://www.debian.org/Pics/red-upperleft.png" align="left" border="0" hspace="0" vspace="0"
+     alt="" width="15" height="16"></td>
+
+    <td rowspan="2" class="reddy">Debian testing security team - Advisory</td>
+    <td class="reddy">
+    <img src="http://www.debian.org/Pics/red-upperright.png" align="right" border="0" hspace="0" vspace="0"
+     alt="" width="16" height="16"></td>
+    </tr>
+    <tr>
+    <td class="reddy">
+    <img src="http://www.debian.org/Pics/red-lowerleft.png" align="left" border="0" hspace="0" vspace="0"
+     alt="" width="16" height="16"></td>
+    <td class="reddy">
+
+    <img src="http://www.debian.org/Pics/red-lowerright.png" align="right" border="0" hspace="0" vspace="0"
+     alt="" width="15" height="16"></td>
+    </tr>
+    </table>
+
+<!-- header -->
+<h2>DTSA-16-1</h2>
+<dl>
+<dt>Date Reported:</dt>
+<dd>September 15, 2005</dd>
+<dt>Affected Package:</dt>
+<dd><a href='http://packages.debian.org/src:linux-2.6'>linux-2.6</a></dd>
+<dt>Vulnerability:</dt>
+<dd>several holes</dd>
+<dt>Problem-Scope:</dt>
+<dd>remote</dd>
+<dt>Debian-specific:</dt>
+<dd>No<br></dd>
+<dt>CVE:</dt>
+<dd>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2098'>CAN-2005-2098</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2099'>CAN-2005-2099</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2456'>CAN-2005-2456</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2617'>CAN-2005-2617</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1913'>CAN-2005-1913</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2457'>CAN-2005-2457</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2458'>CAN-2005-2458</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2459'>CAN-2005-2459</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2548'>CAN-2005-2548</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302'>CAN-2004-2302</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1765'>CAN-2005-1765</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1762'>CAN-2005-1762</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2555'>CAN-2005-2555</a> 
+<br></dd>
+<br><dt>More information:</dt>
+<dd>Several security related problems have been found in version 2.6 of the&nbsp;<br>
+linux kernel. The Common Vulnerabilities and Exposures project identifies&nbsp;<br>
+the following problems:&nbsp;<br>
+&nbsp;<br>
+CAN-2004-2302&nbsp;<br>
+&nbsp;<br>
+  Race condition in the sysfs_read_file and sysfs_write_file functions in&nbsp;<br>
+  Linux kernel before 2.6.10 allows local users to read kernel memory and&nbsp;<br>
+  cause a denial of service (crash) via large offsets in sysfs files.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-1761&nbsp;<br>
+&nbsp;<br>
+  Vulnerability in the Linux kernel allows local users to cause a&nbsp;<br>
+  denial of service (kernel crash) via ptrace.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-1762&nbsp;<br>
+&nbsp;<br>
+  The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64&nbsp;<br>
+  platform allows local users to cause a denial of service (kernel crash) via&nbsp;<br>
+  a "non-canonical" address.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-1765&nbsp;<br>
+&nbsp;<br>
+  syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when&nbsp;<br>
+  running in 32-bit compatibility mode, allows local users to cause a denial&nbsp;<br>
+  of service (kernel hang) via crafted arguments.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-1913&nbsp;<br>
+&nbsp;<br>
+  When a non group-leader thread called exec() to execute a different program&nbsp;<br>
+  while an itimer was pending, the timer expiry would signal the old group&nbsp;<br>
+  leader task, which did not exist any more. This caused a kernel panic.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2098 &nbsp;<br>
+&nbsp;<br>
+  The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before&nbsp;<br>
+  2.6.12.5 contains an error path that does not properly release the session&nbsp;<br>
+  management semaphore, which allows local users or remote attackers to cause&nbsp;<br>
+  a denial of service (semaphore hang) via a new session keyring (1) with an&nbsp;<br>
+  empty name string, (2) with a long name string, (3) with the key quota&nbsp;<br>
+  reached, or (4) ENOMEM.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2099&nbsp;<br>
+&nbsp;<br>
+  The Linux kernel before 2.6.12.5 does not properly destroy a keyring that&nbsp;<br>
+  is not instantiated properly, which allows local users or remote attackers&nbsp;<br>
+  to cause a denial of service (kernel oops) via a keyring with a payload&nbsp;<br>
+  that is not empty, which causes the creation to fail, leading to a null&nbsp;<br>
+  dereference in the keyring destructor.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2456&nbsp;<br>
+&nbsp;<br>
+  Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c&nbsp;<br>
+  in Linux kernel 2.6 allows local users to cause a denial of service (oops&nbsp;<br>
+  or deadlock) and possibly execute arbitrary code via a p->dir value that is&nbsp;<br>
+  larger than XFRM_POLICY_OUT, which is used as an index in the&nbsp;<br>
+  sock->sk_policy array.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2457&nbsp;<br>
+&nbsp;<br>
+  The driver for compressed ISO file systems (zisofs) in the Linux kernel&nbsp;<br>
+  before 2.6.12.5 allows local users and remote attackers to cause a denial&nbsp;<br>
+  of service (kernel crash) via a crafted compressed ISO file system.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2458&nbsp;<br>
+&nbsp;<br>
+  inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows&nbsp;<br>
+  remote attackers to cause a denial of service (kernel crash) via a&nbsp;<br>
+  compressed file with "improper tables".&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2459&nbsp;<br>
+&nbsp;<br>
+  The huft_build function in inflate.c in the zlib routines in the Linux&nbsp;<br>
+  kernel before 2.6.12.5 returns the wrong value, which allows remote&nbsp;<br>
+  attackers to cause a denial of service (kernel crash) via a certain&nbsp;<br>
+  compressed file that leads to a null pointer dereference, a different&nbsp;<br>
+  vulnerbility than CAN-2005-2458.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2548&nbsp;<br>
+&nbsp;<br>
+  vlan_dev.c in Linux kernel 2.6.8 allows remote attackers to cause a denial&nbsp;<br>
+  of service (kernel oops from null dereference) via certain UDP packets that&nbsp;<br>
+  lead to a function call with the wrong argument, as demonstrated using&nbsp;<br>
+  snmpwalk on snmpd.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2555&nbsp;<br>
+&nbsp;<br>
+  Linux kernel 2.6.x does not properly restrict socket policy access to users&nbsp;<br>
+  with the CAP_NET_ADMIN capability, which could allow local users to conduct&nbsp;<br>
+  unauthorized activities via (1) ipv4/ip_sockglue.c and (2)&nbsp;<br>
+  ipv6/ipv6_sockglue.c.&nbsp;<br>
+&nbsp;<br>
+CAN-2005-2617&nbsp;<br>
+&nbsp;<br>
+  The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12&nbsp;<br>
+  and later, on the amd64 architecture, does not check the return value of&nbsp;<br>
+  the insert_vm_struct function, which allows local users to trigger a memory&nbsp;<br>
+  leak via a 32-bit application with crafted ELF headers.&nbsp;<br>
+&nbsp;<br>
+In addition this update fixes some security issues that have not been&nbsp;<br>
+assigned CVE ids:&nbsp;<br>
+&nbsp;<br>
+  - Fix DST leak in icmp_push_reply().  Possible remote DoS?&nbsp;<br>
+&nbsp;<br>
+  - NPTL signal delivery deadlock fix; possible local DoS.&nbsp;<br>
+  &nbsp;<br>
+  - fix a memory leak in devices seq_file implementation; local DoS.&nbsp;<br>
+&nbsp;<br>
+  - Fix SKB leak in ip6_input_finish(); local DoS.&nbsp;<br>
+</dd>
+<br><dt>For the testing distribution (etch) this is fixed in version 2.6.12-6</dt>
+<dt>For the unstable distribution (sid) this is fixed in version 2.6.12-6</dt>
+</dl>
+<p>
+The Debian testing security team does not track security issues for the
+stable (sarge) and oldstable (woody) distributions. If stable is vulnerable,
+the Debian security team will make an announcement once a fix is ready.
+</p>
+<p>
+Your system does not need to be configured to use the Debian testing security
+archive to install this update. The fixed kernel packages are available
+in the regular Debian testing archive.
+</p>
+<p>
+To install the update, first run this command as root:
+</p>
+<p>
+  apt-get update
+</p>
+<p>
+Next, install an appropriate kernel package for your architecture and
+machine. The following kernel will work for all i386 machines:
+</p>
+<p>
+  apt-get install linux-image-2.6-386
+</p>
+<p>
+However, you may prefer to install an optimised kernel for your machine:
+</p>
+<p>
+  apt-get install linux-image-2.6-686<br>
+  apt-get install linux-image-2.6-686-smp<br>
+  apt-get install linux-image-2.6-k7<br>
+  apt-get install linux-image-2.6-k7-smp<br>
+</p>
+<p>
+For the amd64 architecture, chose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-amd64-generic<br>
+  apt-get install linux-image-2.6-amd64-k8<br>
+  apt-get install linux-image-2.6-amd64-k8-smp<br>
+</p>
+<p>
+For the powerpc architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-powerpc<br>
+  apt-get install linux-image-2.6-powerpc-smp<br>
+  apt-get install linux-image-2.6-powerpc64<br>
+</p>
+<p>
+For the sparc architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-sparc64<br>
+  apt-get install linux-image-2.6-sparc64-smp<br>
+</p>
+<p>
+  (Note that users of 32 bit sparc systems are no longer supported by the
+  2.6 kernel.)
+</p>
+<p>
+For the alpha architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-alpha-generic<br>
+  apt-get install linux-image-2.6-alpha-smp<br>
+</p>
+<p>
+For the ia64 architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-itanium<br>
+  apt-get install linux-image-2.6-itanium-smp<br>
+  apt-get install linux-image-2.6-mckinley<br>
+  apt-get install linux-image-2.6-mckinley-smp<br>
+</p>
+<p>
+For the hppa architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-parisc<br>
+  apt-get install linux-image-2.6-parisc-smp<br>
+  apt-get install linux-image-2.6-parisc64<br>
+  apt-get install linux-image-2.6-parisc64-smp<br>
+</p>
+<p>
+For the s390 architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-s390<br>
+  apt-get install linux-image-2.6-s390x<br>
+</p>
+<p>
+For the arm architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-footbridge<br>
+  apt-get install linux-image-2.6-ixp4xx<br>
+  apt-get install linux-image-2.6-rpc<br>
+  apt-get install linux-image-2.6-s3c2410<br>
+</p>
+<p>
+For the m68k architecture, choose one of these kernels:
+</p>
+<p>
+  apt-get install linux-image-2.6-amiga<br>
+  apt-get install linux-image-2.6-atari<br>
+  apt-get install linux-image-2.6-bvme6000<br>
+  apt-get install linux-image-2.6-hp<br>
+  apt-get install linux-image-2.6-mac<br>
+  apt-get install linux-image-2.6-mvme147<br>
+  apt-get install linux-image-2.6-mvme16x<br>
+  apt-get install linux-image-2.6-q40<br>
+  apt-get install linux-image-2.6-sun3<br>
+</p>
+<p>
+Updated kernels are not yet available for the mips and mipsel
+architectures.
+</p>
+<p>
+Note that you may also need to upgrade third-party modules that are not
+included in the kernel package.
+</p>
+<p>
+Finally, reboot the system, taking care to boot the new 2.6.12 kernel with
+your bootloader.
+<br>
+
+<!-- footer -->
+<hr>
+<a href="http://validator.w3.org/check?uri=referer">
+    <img border="0" src="http://www.w3.org/Icons/valid-html401" alt="Valid HTML 4.01!" height="31" width="88"></a>
+    <a href="http://jigsaw.w3.org/css-validator/check/referer">
+    <img border="0" src="http://jigsaw.w3.org/css-validator/images/vcss" alt="Valid CSS!"
+     height="31" width="88"></a>
+
+
+</body></html>
+

Modified: website/list.html
===================================================================
--- website/list.html	2005-09-15 15:40:40 UTC (rev 2005)
+++ website/list.html	2005-09-15 16:04:59 UTC (rev 2006)
@@ -67,6 +67,8 @@
 <dd>several</dd>
 <dt>[September 13th, 2005] <a href='DTSA/DTSA-15-1.html'>DTSA-15-1 php4</a></dt>
 <dd>several vulnerabilities</dd>
+<dt>[September 15, 2005] <a href='DTSA/DTSA-16-1.html'>DTSA-16-1 linux-2.6</a></dt>
+<dd>various</dd>
 </dl>
 <!-- footer -->
 <hr>




More information about the Secure-testing-commits mailing list