Boletines de Vulnerabilidades |
Múltiples vulnerabilidades en el acceso a servidores Samba desde Linux |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado |
Linux kernel 2.4 <= 2.4.27 Linux Kernel 2.6 <= 2.6.9 |
Descripción |
|
Se han descubierto una serie de vulnerabilidades en la implementación de smbfs (Samba filesystem) en los núcleos 2.4 y 2.6 de Linux. Estas vulnerabilidades pueden ser explotadas para provocar una denegación de servicio sobre el sistema completo, o fuga de información. Para la explotación, el atacante debe controlar el servidor Samba al que se conecta el cliente víctima, o bien falsear sus respuestas mediante un ataque tipo Man In The Middle. Existe la posibilidad de que alguna de estas vulnerabilidades pueda utilizarse para ejecutar código arbitrario en el sistema afectado, si bien este extremo no se ha confirmado todavía. A continuación se describen las diferentes vulnerabilidades encontradas. 1) Desbordamiento de memoria al recibir respuestas a peticiones smb_proc_read(X) Sistemas afectados: Linux 2.4.x Cuando se recibe una respuesta a una petición de lectura, el cliente confía la cantidad de datos que el servidor dice estar devolviendo, copiando toda esa información en los búfers correspondientes. Si el servidor engaña al cliente haciéndole llegar más datos de los que se han solicitado, se producirá sobreescritura de espacios de memoria del kernel, causando una caída del sistema. Es posible que este fallo pueda utilizarse para ejecutar código arbitrario en el cliente. 2) Fuga de información en la respuesta a peticiones smb_proc_readX Sistemas afectados: Linux 2.4.x Una comprobación inadecuada del offset de los datos en las respuestas a peticiones readX puede hacer que el sistema filtre información de la memoria. Además, si se accede a zonas protegidas de la memoria, puede provocarse la caída del sistema. 3) Desbordamiento en la defragmentación con smb_receive_trans2 Sistemas afectados: Linux 2.4.x Al acabar el proceso de defragmentación de paquetes TRANS2, en ocasiones el paquete completo se mueve a otra zona de memoria. Una comprobación inadecuada de los límites de las estructuras de datos puede hacer que se sobreescriban datos de memoria al hacer la escritura, provocando una caída del sistema. 4) Denegación de servicio en peticiones smb_proc_readX_data Sistemas afectados: Linux 2.6.x Al recibir un offset por parte del servidor, se comprueba su límite superior antes de realizar una serie de operaciones, pero no el inferior, pudiendo producirse un acceso a las zonas de memoria anteriores al punto en que debía leerse. Estas zonas estarán reservadas y se provocará una condición de denegación de servicio. 5) Denegación de servicio o fuga de información vía smb_receive_trans2 Sistemas afectados: Linux 2.4.x y 2.6.x El offset presentado por el servidor no se comprueba adecuadamente, produciéndose accesos a zonas de memoria que harán que, o se filtre información, o (si están protegidas) caiga el sistema. 6) Fuga de información con smb_recv_trans2 Sistemas afectados: Linux 2.4.x y 2.6.x El proceso de defragmentación de paquetes TRANS2 no inicializa algunos búfers adecuadamente, pudiéndose filtrar la información que anteriormente existiera en esa zona de memoria. 7) Pérdida de control sobre algunos contadores vía smb_recv_trans2 Sistemas afectados: Linux 2.4.x y 2.6.x El proceso de defragmentación de un paquete puede prolongarse indefinidamente si una de las partes envía repetidamente algunos fragmentos, perdiéndose el control sobre algunas estructuras de datos (los contadores de parámetros recibidos y de datos recibidos). |
|
Solución |
|
Utilice los mecanismos de actualización propios de su distribución Linux, o bien descargue las fuentes del núcleo y compílelo usted mismo. Actualización de software Linux kernel 2.4 Instale la versión 2.4.28 o superior ftp://ftp.kernel.org/pub/linux/kernel/v2.4 Linux kernel 2.6 Todavía no se dispone de una versión actualizada Suse Linux Decargue los parches necesarios mediante YAST o desde el servidor FTP oficial de Suse Linux Red Hat Linux Red Hat Enterprise Linux AS version 3 & SRPMS: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Enterprise Linux AS version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Enterprise Linux AS version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Enterprise Linux AS version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Enterprise Linux AS version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Enterprise Linux AS version 3 & ia64: kernel-2.4.21-20.0.1.EL.ia64.rpm kernel-doc-2.4.21-20.0.1.EL.ia64.rpm kernel-source-2.4.21-20.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm Red Hat Enterprise Linux AS version 3 & ppc64: kernel-doc-2.4.21-20.0.1.EL.ppc64.rpm kernel-source-2.4.21-20.0.1.EL.ppc64.rpm Red Hat Enterprise Linux AS version 3 & ppc64iseries: kernel-2.4.21-20.0.1.EL.ppc64iseries.rpm kernel-unsupported-2.4.21-20.0.1.EL.ppc64iseries.rpm Red Hat Enterprise Linux AS version 3 & ppc64pseries: kernel-2.4.21-20.0.1.EL.ppc64pseries.rpm kernel-unsupported-2.4.21-20.0.1.EL.ppc64pseries.rpm Red Hat Enterprise Linux AS version 3 & s390: kernel-2.4.21-20.0.1.EL.s390.rpm kernel-doc-2.4.21-20.0.1.EL.s390.rpm kernel-source-2.4.21-20.0.1.EL.s390.rpm kernel-unsupported-2.4.21-20.0.1.EL.s390.rpm Red Hat Enterprise Linux AS version 3 & s390x: kernel-2.4.21-20.0.1.EL.s390x.rpm kernel-doc-2.4.21-20.0.1.EL.s390x.rpm kernel-source-2.4.21-20.0.1.EL.s390x.rpm kernel-unsupported-2.4.21-20.0.1.EL.s390x.rpm Red Hat Enterprise Linux AS version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Red Hat Desktop version 3 & SRPMS: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Desktop version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Desktop version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Desktop version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Desktop version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Desktop version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3 & SRPM: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Enterprise Linux ES version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Enterprise Linux ES version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Enterprise Linux ES version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Enterprise Linux ES version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Enterprise Linux ES version 3 & ia64: kernel-2.4.21-20.0.1.EL.ia64.rpm kernel-doc-2.4.21-20.0.1.EL.ia64.rpm kernel-source-2.4.21-20.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm Red Hat Enterprise Linux ES version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Red Hat Enterprise Linux WS version 3 & SRPMS: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Enterprise Linux WS version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Enterprise Linux WS version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Enterprise Linux WS version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Enterprise Linux WS version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Enterprise Linux WS version 3 & ia64: kernel-2.4.21-20.0.1.EL.ia64.rpm kernel-doc-2.4.21-20.0.1.EL.ia64.rpm kernel-source-2.4.21-20.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm Red Hat Enterprise Linux WS version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Nuevos parches de Red Hat Linux (RHSA-2004:504-13) Red Hat Enterprise Linux AS (v. 2.1) & SRPMS: kernel-2.4.18-e.52.src.rpm Red Hat Enterprise Linux AS (v. 2.1) & IA-64: kernel-2.4.18-e.52.ia64.rpm kernel-doc-2.4.18-e.52.ia64.rpm kernel-smp-2.4.18-e.52.ia64.rpm kernel-source-2.4.18-e.52.ia64.rpm Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & SRPMS: kernel-2.4.18-e.52.src.rpm Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & IA-64: kernel-2.4.18-e.52.ia64.rpm kernel-doc-2.4.18-e.52.ia64.rpm kernel-smp-2.4.18-e.52.ia64.rpm kernel-source-2.4.18-e.52.ia64.rpm Nuevos parches de Red Hat (RHSA-2004:505-14) Red Hat Enterprise Linux AS (v. 2.1) & SRPMS: kernel-2.4.9-e.57.src.rpm Red Hat Enterprise Linux AS (v. 2.1) & IA-32: kernel-2.4.9-e.57.athlon.rpm kernel-2.4.9-e.57.i686.rpm kernel-BOOT-2.4.9-e.57.i386.rpm kernel-debug-2.4.9-e.57.i686.rpm kernel-doc-2.4.9-e.57.i386.rpm kernel-enterprise-2.4.9-e.57.i686.rpm kernel-headers-2.4.9-e.57.i386.rpm kernel-smp-2.4.9-e.57.athlon.rpm kernel-smp-2.4.9-e.57.i686.rpm kernel-source-2.4.9-e.57.i386.rpm kernel-summit-2.4.9-e.57.i686.rpm Red Hat Enterprise Linux ES (v. 2.1) & SRPMS: kernel-2.4.9-e.57.src.rpm Red Hat Enterprise Linux ES (v. 2.1) & IA-32: kernel-2.4.9-e.57.athlon.rpm kernel-2.4.9-e.57.i686.rpm kernel-BOOT-2.4.9-e.57.i386.rpm kernel-debug-2.4.9-e.57.i686.rpm kernel-doc-2.4.9-e.57.i386.rpm kernel-headers-2.4.9-e.57.i386.rpm kernel-smp-2.4.9-e.57.athlon.rpm kernel-smp-2.4.9-e.57.i686.rpm kernel-source-2.4.9-e.57.i386.rpm Red Hat Enterprise Linux WS (v. 2.1) & SRPMS: kernel-2.4.9-e.57.src.rpm Red Hat Enterprise Linux WS (v. 2.1) & IA-32: kernel-2.4.9-e.57.athlon.rpm kernel-2.4.9-e.57.i686.rpm kernel-BOOT-2.4.9-e.57.i386.rpm kernel-debug-2.4.9-e.57.i686.rpm kernel-doc-2.4.9-e.57.i386.rpm kernel-enterprise-2.4.9-e.57.i686.rpm kernel-headers-2.4.9-e.57.i386.rpm kernel-smp-2.4.9-e.57.athlon.rpm kernel-smp-2.4.9-e.57.i686.rpm kernel-source-2.4.9-e.57.i386.rpm https://rhn.redhat.com/ Mandrake Linux Mandrakelinux 9.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-enterprise-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-i686-up-4GB-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-p3-smp-64GB-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-source-2.4.22-41mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-source-2.4.22-41mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.4.25-13mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.6.3-25mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i686-up-64GB-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm Mandrake Multi Network Firewall 8.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/modutils-2.4.19-5mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/modutils-2.4.19-5mdk.src.rpm Mandrake Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-enterprise-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm Mandrake Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm Debian (kernel 2.4.16) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz ARM http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb Debian (kernel 2.4.18) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb Debian (kernel 2.4.19) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb Debian (kernel 2.4.17) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb HP Precision http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb Intel IA-64 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb IBM S/390 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb ARM http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb Motorola 680x0 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE |
CAN-2004-0883 CAN-2004-0949 |
BID | 11695 |
Recursos adicionales |
|
Securiteam - Linux 2.x smbfs Multiple Remote Vulnerabilities http://www.securiteam.com/unixfocus/6J00B2ABPQ.html e-matters Security Advisory 14/2004 http://security.e-matters.de/advisories/142004.html Linux Kernel 2.4.28 Changelog http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.28 SuSE Linux security advisory SUSE-SA:2004:042 http://www.suse.de/de/security/2004_42_kernel.html Red Hat Security Advisory (RHSA-2004:549-10) https://rhn.redhat.com/errata/RHSA-2004-549.html Red Hat Linux Security Advisory (RHSA-2004:504-13) https://rhn.redhat.com/errata/RHSA-2004-504.html Red Hat Linux Security Advisory (RHSA-2004:505-14) https://rhn.redhat.com/errata/RHSA-2004-505.html Mandrakesoft Security Advisories MDKSA-2005:022 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022 Debian Security Advisory (DSA 1067-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00152.html Debian Security Advisory (DSA 1069-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00156.html Debian Security Advisory (DSA 1070-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00155.html Debian Security Advisory (DSA 1082-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00168.html |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2004-11-19 |
1.1 | Aviso emitido por Suse Linux (SUSE-SA:2004:042) | 2004-12-02 |
1.2 | Aviso emitido por Red Hat Linux (RHSA-2004:549-10) | 2004-12-03 |
1.3 | Nuevos parches emitidos por Red Hat Linux (RHSA-2004:504-13) y (RHSA-2004:505-14) | 2004-12-14 |
1.4 | Aviso emitido por Mandrake (MDKSA-2005:022) | 2005-01-26 |
1.5 | Aviso emitido por Debian (DSA 1067-1, DSA 1069-1, DSA 1070-1) | 2006-05-22 |
1.6 | Aviso emitido por Debian (DSA 1082-1) | 2006-05-31 |