int(1158)

Boletines de Vulnerabilidades


Múltiples vulnerabilidades en el acceso a servidores Samba desde Linux

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Denegación de Servicio
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio exotico

Información sobre el sistema

Propiedad Valor
Fabricant afectat GNU/Linux
Software afectado Linux kernel 2.4 <= 2.4.27
Linux Kernel 2.6 <= 2.6.9

Descripción

Se han descubierto una serie de vulnerabilidades en la implementación de smbfs (Samba filesystem) en los núcleos 2.4 y 2.6 de Linux. Estas vulnerabilidades pueden ser explotadas para provocar una denegación de servicio sobre el sistema completo, o fuga de información.

Para la explotación, el atacante debe controlar el servidor Samba al que se conecta el cliente víctima, o bien falsear sus respuestas mediante un ataque tipo Man In The Middle.

Existe la posibilidad de que alguna de estas vulnerabilidades pueda utilizarse para ejecutar código arbitrario en el sistema afectado, si bien este extremo no se ha confirmado todavía.

A continuación se describen las diferentes vulnerabilidades encontradas.

1) Desbordamiento de memoria al recibir respuestas a peticiones smb_proc_read(X)
Sistemas afectados: Linux 2.4.x
Cuando se recibe una respuesta a una petición de lectura, el cliente confía la cantidad de datos que el servidor dice estar devolviendo, copiando toda esa información en los búfers correspondientes. Si el servidor engaña al cliente haciéndole llegar más datos de los que se han solicitado, se producirá sobreescritura de espacios de memoria del kernel, causando una caída del sistema. Es posible que este fallo pueda utilizarse para ejecutar código arbitrario en el cliente.

2) Fuga de información en la respuesta a peticiones smb_proc_readX
Sistemas afectados: Linux 2.4.x
Una comprobación inadecuada del offset de los datos en las respuestas a peticiones readX puede hacer que el sistema filtre información de la memoria. Además, si se accede a zonas protegidas de la memoria, puede provocarse la caída del sistema.

3) Desbordamiento en la defragmentación con smb_receive_trans2
Sistemas afectados: Linux 2.4.x
Al acabar el proceso de defragmentación de paquetes TRANS2, en ocasiones el paquete completo se mueve a otra zona de memoria. Una comprobación inadecuada de los límites de las estructuras de datos puede hacer que se sobreescriban datos de memoria al hacer la escritura, provocando una caída del sistema.

4) Denegación de servicio en peticiones smb_proc_readX_data
Sistemas afectados: Linux 2.6.x
Al recibir un offset por parte del servidor, se comprueba su límite superior antes de realizar una serie de operaciones, pero no el inferior, pudiendo producirse un acceso a las zonas de memoria anteriores al punto en que debía leerse. Estas zonas estarán reservadas y se provocará una condición de denegación de servicio.

5) Denegación de servicio o fuga de información vía smb_receive_trans2
Sistemas afectados: Linux 2.4.x y 2.6.x
El offset presentado por el servidor no se comprueba adecuadamente, produciéndose accesos a zonas de memoria que harán que, o se filtre información, o (si están protegidas) caiga el sistema.

6) Fuga de información con smb_recv_trans2
Sistemas afectados: Linux 2.4.x y 2.6.x
El proceso de defragmentación de paquetes TRANS2 no inicializa algunos búfers adecuadamente, pudiéndose filtrar la información que anteriormente existiera en esa zona de memoria.

7) Pérdida de control sobre algunos contadores vía smb_recv_trans2
Sistemas afectados: Linux 2.4.x y 2.6.x
El proceso de defragmentación de un paquete puede prolongarse indefinidamente si una de las partes envía repetidamente algunos fragmentos, perdiéndose el control sobre algunas estructuras de datos (los contadores de parámetros recibidos y de datos recibidos).

Solución

Utilice los mecanismos de actualización propios de su distribución Linux, o bien descargue las fuentes del núcleo y compílelo usted mismo.


Actualización de software

Linux kernel 2.4
Instale la versión 2.4.28 o superior
ftp://ftp.kernel.org/pub/linux/kernel/v2.4

Linux kernel 2.6
Todavía no se dispone de una versión actualizada

Suse Linux
Decargue los parches necesarios mediante YAST o desde el servidor FTP oficial de Suse Linux

Red Hat Linux

Red Hat Enterprise Linux AS version 3 & SRPMS:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Enterprise Linux AS version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Enterprise Linux AS version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Enterprise Linux AS version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Enterprise Linux AS version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Enterprise Linux AS version 3 & ia64:
kernel-2.4.21-20.0.1.EL.ia64.rpm
kernel-doc-2.4.21-20.0.1.EL.ia64.rpm
kernel-source-2.4.21-20.0.1.EL.ia64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm

Red Hat Enterprise Linux AS version 3 & ppc64:
kernel-doc-2.4.21-20.0.1.EL.ppc64.rpm
kernel-source-2.4.21-20.0.1.EL.ppc64.rpm

Red Hat Enterprise Linux AS version 3 & ppc64iseries:
kernel-2.4.21-20.0.1.EL.ppc64iseries.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ppc64iseries.rpm

Red Hat Enterprise Linux AS version 3 & ppc64pseries:
kernel-2.4.21-20.0.1.EL.ppc64pseries.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ppc64pseries.rpm

Red Hat Enterprise Linux AS version 3 & s390:
kernel-2.4.21-20.0.1.EL.s390.rpm
kernel-doc-2.4.21-20.0.1.EL.s390.rpm
kernel-source-2.4.21-20.0.1.EL.s390.rpm
kernel-unsupported-2.4.21-20.0.1.EL.s390.rpm

Red Hat Enterprise Linux AS version 3 & s390x:
kernel-2.4.21-20.0.1.EL.s390x.rpm
kernel-doc-2.4.21-20.0.1.EL.s390x.rpm
kernel-source-2.4.21-20.0.1.EL.s390x.rpm
kernel-unsupported-2.4.21-20.0.1.EL.s390x.rpm

Red Hat Enterprise Linux AS version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Red Hat Desktop version 3 & SRPMS:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Desktop version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Desktop version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Desktop version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Desktop version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Desktop version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3 & SRPM:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Enterprise Linux ES version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Enterprise Linux ES version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Enterprise Linux ES version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Enterprise Linux ES version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Enterprise Linux ES version 3 & ia64:
kernel-2.4.21-20.0.1.EL.ia64.rpm
kernel-doc-2.4.21-20.0.1.EL.ia64.rpm
kernel-source-2.4.21-20.0.1.EL.ia64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm

Red Hat Enterprise Linux ES version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3 & SRPMS:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Enterprise Linux WS version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Enterprise Linux WS version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Enterprise Linux WS version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Enterprise Linux WS version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Enterprise Linux WS version 3 & ia64:
kernel-2.4.21-20.0.1.EL.ia64.rpm
kernel-doc-2.4.21-20.0.1.EL.ia64.rpm
kernel-source-2.4.21-20.0.1.EL.ia64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm

Red Hat Enterprise Linux WS version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Nuevos parches de Red Hat Linux (RHSA-2004:504-13)

Red Hat Enterprise Linux AS (v. 2.1) & SRPMS:
kernel-2.4.18-e.52.src.rpm

Red Hat Enterprise Linux AS (v. 2.1) & IA-64:
kernel-2.4.18-e.52.ia64.rpm
kernel-doc-2.4.18-e.52.ia64.rpm
kernel-smp-2.4.18-e.52.ia64.rpm
kernel-source-2.4.18-e.52.ia64.rpm

Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & SRPMS:
kernel-2.4.18-e.52.src.rpm

Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & IA-64:
kernel-2.4.18-e.52.ia64.rpm
kernel-doc-2.4.18-e.52.ia64.rpm
kernel-smp-2.4.18-e.52.ia64.rpm
kernel-source-2.4.18-e.52.ia64.rpm

Nuevos parches de Red Hat (RHSA-2004:505-14)

Red Hat Enterprise Linux AS (v. 2.1) & SRPMS:
kernel-2.4.9-e.57.src.rpm

Red Hat Enterprise Linux AS (v. 2.1) & IA-32:
kernel-2.4.9-e.57.athlon.rpm
kernel-2.4.9-e.57.i686.rpm
kernel-BOOT-2.4.9-e.57.i386.rpm
kernel-debug-2.4.9-e.57.i686.rpm
kernel-doc-2.4.9-e.57.i386.rpm
kernel-enterprise-2.4.9-e.57.i686.rpm
kernel-headers-2.4.9-e.57.i386.rpm
kernel-smp-2.4.9-e.57.athlon.rpm
kernel-smp-2.4.9-e.57.i686.rpm
kernel-source-2.4.9-e.57.i386.rpm
kernel-summit-2.4.9-e.57.i686.rpm

Red Hat Enterprise Linux ES (v. 2.1) & SRPMS:
kernel-2.4.9-e.57.src.rpm

Red Hat Enterprise Linux ES (v. 2.1) & IA-32:
kernel-2.4.9-e.57.athlon.rpm
kernel-2.4.9-e.57.i686.rpm
kernel-BOOT-2.4.9-e.57.i386.rpm
kernel-debug-2.4.9-e.57.i686.rpm
kernel-doc-2.4.9-e.57.i386.rpm
kernel-headers-2.4.9-e.57.i386.rpm
kernel-smp-2.4.9-e.57.athlon.rpm
kernel-smp-2.4.9-e.57.i686.rpm
kernel-source-2.4.9-e.57.i386.rpm

Red Hat Enterprise Linux WS (v. 2.1) & SRPMS:
kernel-2.4.9-e.57.src.rpm

Red Hat Enterprise Linux WS (v. 2.1) & IA-32:
kernel-2.4.9-e.57.athlon.rpm
kernel-2.4.9-e.57.i686.rpm
kernel-BOOT-2.4.9-e.57.i386.rpm
kernel-debug-2.4.9-e.57.i686.rpm
kernel-doc-2.4.9-e.57.i386.rpm
kernel-enterprise-2.4.9-e.57.i686.rpm
kernel-headers-2.4.9-e.57.i386.rpm
kernel-smp-2.4.9-e.57.athlon.rpm
kernel-smp-2.4.9-e.57.i686.rpm
kernel-source-2.4.9-e.57.i386.rpm
https://rhn.redhat.com/

Mandrake Linux

Mandrakelinux 9.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-enterprise-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-i686-up-4GB-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-p3-smp-64GB-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-source-2.4.22-41mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-source-2.4.22-41mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm

Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.4.25-13mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.6.3-25mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm

Mandrakelinux 10.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i686-up-64GB-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm

Mandrake Multi Network Firewall 8.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/modutils-2.4.19-5mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/modutils-2.4.19-5mdk.src.rpm

Mandrake Corporate Server 2.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-enterprise-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm

Mandrake Corporate Server 3.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm

Debian (kernel 2.4.16)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz
ARM
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb

Debian (kernel 2.4.18)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb
Alpha
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb
Intel IA-32
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb
PowerPC
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb

Debian (kernel 2.4.19)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb
Sun Sparc
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb

Debian (kernel 2.4.17)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb
HP Precision
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb
Intel IA-64
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb
IBM S/390
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb
PowerPC
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb
Alpha
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb
ARM
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb
Sun Sparc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb

Identificadores estándar

Propiedad Valor
CVE CAN-2004-0883
CAN-2004-0949
BID 11695

Recursos adicionales

Securiteam - Linux 2.x smbfs Multiple Remote Vulnerabilities
http://www.securiteam.com/unixfocus/6J00B2ABPQ.html

e-matters Security Advisory 14/2004
http://security.e-matters.de/advisories/142004.html

Linux Kernel 2.4.28 Changelog
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.28

SuSE Linux security advisory SUSE-SA:2004:042
http://www.suse.de/de/security/2004_42_kernel.html

Red Hat Security Advisory (RHSA-2004:549-10)
https://rhn.redhat.com/errata/RHSA-2004-549.html

Red Hat Linux Security Advisory (RHSA-2004:504-13)
https://rhn.redhat.com/errata/RHSA-2004-504.html

Red Hat Linux Security Advisory (RHSA-2004:505-14)
https://rhn.redhat.com/errata/RHSA-2004-505.html

Mandrakesoft Security Advisories MDKSA-2005:022
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022

Debian Security Advisory (DSA 1067-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00152.html

Debian Security Advisory (DSA 1069-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00156.html

Debian Security Advisory (DSA 1070-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00155.html

Debian Security Advisory (DSA 1082-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00168.html

Histórico de versiones

Versión Comentario Data
1.0 Aviso emitido 2004-11-19
1.1 Aviso emitido por Suse Linux (SUSE-SA:2004:042) 2004-12-02
1.2 Aviso emitido por Red Hat Linux (RHSA-2004:549-10) 2004-12-03
1.3 Nuevos parches emitidos por Red Hat Linux (RHSA-2004:504-13) y (RHSA-2004:505-14) 2004-12-14
1.4 Aviso emitido por Mandrake (MDKSA-2005:022) 2005-01-26
1.5 Aviso emitido por Debian (DSA 1067-1, DSA 1069-1, DSA 1070-1) 2006-05-22
1.6 Aviso emitido por Debian (DSA 1082-1) 2006-05-31
Ministerio de Defensa
CNI
CCN
CCN-CERT