Boletines de Vulnerabilidades |
Denegación de Servicio en el Kernel de Linux |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Avanzado |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | Linux Kernel <= 2.4.26 |
Descripción |
|
Se han encontrado dos vulnerabilidades en el Kernel de Linux, que podrían ser explotadas por un atacante con cuenta en el sistema afectado para escalar privilegios o generar una situación de Denegación de Servicio. CAN-2004-1144 - Existe una error de comprobación de límites en el manejo de las llamadas de sistema de los emuladores de 32 bits por parte de los sistemas AMD64 / Intel EM64T. CAN-2004-1234 - Existe un error en el manejo de memoria con los ejecutables ELF que podría ser explotado para generar una situación de Denegación de Servicio mediante la creación de un binario ELF malicioso. |
|
Solución |
|
Actualización de software Red Hat Linux Red Hat Desktop (v. 3)/SRPMS: kernel-2.4.21-27.0.1.EL.src.rpm Red Hat Desktop (v. 3)/IA-32: kernel-2.4.21-27.0.1.EL.athlon.rpm kernel-2.4.21-27.0.1.EL.i686.rpm kernel-BOOT-2.4.21-27.0.1.EL.i386.rpm kernel-doc-2.4.21-27.0.1.EL.i386.rpm kernel-hugemem-2.4.21-27.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-smp-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-2.4.21-27.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-source-2.4.21-27.0.1.EL.i386.rpm kernel-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-27.0.1.EL.i686.rpm Red Hat Desktop (v. 3)/x86_64: kernel-2.4.21-27.0.1.EL.ia32e.rpm kernel-2.4.21-27.0.1.EL.x86_64.rpm kernel-doc-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.x86_64.rpm kernel-source-2.4.21-27.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-27.0.1.EL.x86_64.rpm Red Hat Enterprise Linux AS (v. 3)/SRPMS: kernel-2.4.21-27.0.1.EL.src.rpm Red Hat Enterprise Linux AS (v. 3)/IA-32: kernel-2.4.21-27.0.1.EL.athlon.rpm kernel-2.4.21-27.0.1.EL.i686.rpm kernel-BOOT-2.4.21-27.0.1.EL.i386.rpm kernel-doc-2.4.21-27.0.1.EL.i386.rpm kernel-hugemem-2.4.21-27.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-smp-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-2.4.21-27.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-source-2.4.21-27.0.1.EL.i386.rpm kernel-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-27.0.1.EL.i686.rpm Red Hat Enterprise Linux AS (v. 3)/IA-64: kernel-2.4.21-27.0.1.EL.ia64.rpm kernel-doc-2.4.21-27.0.1.EL.ia64.rpm kernel-source-2.4.21-27.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia64.rpm Red Hat Enterprise Linux AS (v. 3)/PPC: kernel-2.4.21-27.0.1.EL.ppc64iseries.rpm kernel-2.4.21-27.0.1.EL.ppc64pseries.rpm kernel-doc-2.4.21-27.0.1.EL.ppc64.rpm kernel-source-2.4.21-27.0.1.EL.ppc64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ppc64iseries.rpm kernel-unsupported-2.4.21-27.0.1.EL.ppc64pseries.rpm Red Hat Enterprise Linux AS (v. 3)/s390: kernel-2.4.21-27.0.1.EL.s390.rpm kernel-doc-2.4.21-27.0.1.EL.s390.rpm kernel-source-2.4.21-27.0.1.EL.s390.rpm kernel-unsupported-2.4.21-27.0.1.EL.s390.rpm Red Hat Enterprise Linux AS (v. 3)/s390x: kernel-2.4.21-27.0.1.EL.s390x.rpm kernel-doc-2.4.21-27.0.1.EL.s390x.rpm kernel-source-2.4.21-27.0.1.EL.s390x.rpm kernel-unsupported-2.4.21-27.0.1.EL.s390x.rpm Red Hat Enterprise Linux AS (v. 3)/x86_64: kernel-2.4.21-27.0.1.EL.ia32e.rpm kernel-2.4.21-27.0.1.EL.x86_64.rpm kernel-doc-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.x86_64.rpm kernel-source-2.4.21-27.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-27.0.1.EL.x86_64.rpm Red Hat Enterprise Linux ES (v. 3)/SRPMS: kernel-2.4.21-27.0.1.EL.src.rpm Red Hat Enterprise Linux ES (v. 3)/IA-32: kernel-2.4.21-27.0.1.EL.athlon.rpm kernel-2.4.21-27.0.1.EL.i686.rpm kernel-BOOT-2.4.21-27.0.1.EL.i386.rpm kernel-doc-2.4.21-27.0.1.EL.i386.rpm kernel-hugemem-2.4.21-27.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-smp-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-2.4.21-27.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-source-2.4.21-27.0.1.EL.i386.rpm kernel-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-27.0.1.EL.i686.rpm Red Hat Enterprise Linux ES (v. 3)/IA-64: kernel-2.4.21-27.0.1.EL.ia64.rpm kernel-doc-2.4.21-27.0.1.EL.ia64.rpm kernel-source-2.4.21-27.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia64.rpm Red Hat Enterprise Linux ES (v. 3)/x86_64: kernel-2.4.21-27.0.1.EL.ia32e.rpm kernel-2.4.21-27.0.1.EL.x86_64.rpm kernel-doc-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.x86_64.rpm kernel-source-2.4.21-27.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-27.0.1.EL.x86_64.rpm Red Hat Enterprise Linux WS (v. 3)/SRPMS: kernel-2.4.21-27.0.1.EL.src.rpm Red Hat Enterprise Linux WS (v. 3)/IA-32: kernel-2.4.21-27.0.1.EL.athlon.rpm kernel-2.4.21-27.0.1.EL.i686.rpm kernel-BOOT-2.4.21-27.0.1.EL.i386.rpm kernel-doc-2.4.21-27.0.1.EL.i386.rpm kernel-hugemem-2.4.21-27.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-smp-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-2.4.21-27.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.i686.rpm kernel-source-2.4.21-27.0.1.EL.i386.rpm kernel-unsupported-2.4.21-27.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-27.0.1.EL.i686.rpm Red Hat Enterprise Linux WS (v. 3)/IA-64: kernel-2.4.21-27.0.1.EL.ia64.rpm kernel-doc-2.4.21-27.0.1.EL.ia64.rpm kernel-source-2.4.21-27.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia64.rpm Red Hat Enterprise Linux WS (v. 3)/x86_64: kernel-2.4.21-27.0.1.EL.ia32e.rpm kernel-2.4.21-27.0.1.EL.x86_64.rpm kernel-doc-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-2.4.21-27.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-27.0.1.EL.x86_64.rpm kernel-source-2.4.21-27.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-27.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-27.0.1.EL.x86_64.rpm http://rhn.redhat.com/ Debian (kernel 2.4.16) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz ARM http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb Debian (kernel 2.4.18) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb Debian (kernel 2.4.19) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb Debian (kernel 2.4.17) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb HP Precision http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb Intel IA-64 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb IBM S/390 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb ARM http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb Motorola 680x0 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE |
CAN-2004-1144 CAN-2004-1234 |
BID | |
Recursos adicionales |
|
Red Hat Linux Security Advisory RHSA-2004:689-06 http://rhn.redhat.com/errata/RHSA-2004-689.html Debian Security Advisory (DSA 1067-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00152.html Debian Security Advisory (DSA 1069-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00156.html Debian Security Advisory (DSA 1070-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00155.html Debian Security Advisory (DSA 1082-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00168.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2004-12-24 |
1.1 | Aviso emitido por Debian (DSA 1067-1, DSA 1069-1, DSA 1070-1) | 2006-05-22 |
1.2 | Aviso emitido por Debian (DSA 1082-1) | 2006-05-31 |