Vulnerability Bulletins |
Múltiples vulnerabilidades en el kernel de Linux |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Denegación de Servicio |
Dificulty | Experto |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
Linux Kernel 2.4.x Linux Kernel 2.6.x |
Description |
|
Se han descubierto múltiples vulnerabilidades en el kernel de Linux. Las vulnerabilidades son descritas a continuación: - CAN-2005-0749: Se ha descubierto una vulnerabilidad cuando se libera un puntero en load_elf_library con la que un usuario local podría causar una denegación de servicio del sistema. - CAN-2004-1056: Se ha descubierto una vulnerabilidad en el driver Direct Rendering Manager (DRM) que no comprueba adecuadamente el bloqueo de DMA, con la que un usuario local o remoto podría causar una denegación de servicio del servidor X o posiblemente modificar la salida de video. - CAN-2005-0504: Se ha descubierto una vulnerabilidad en el driver serie moxa con la que un usuario local podría realizar operaciones privilegiadas como cambiar el firmware. |
|
Solution |
|
Actualización de software Red Hat Linux (2.4.18) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Linux Advanced Workstation 2.1 Itanium Processor https://rhn.redhat.com/ Red Hat Linux (2.4.9) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux WS (v. 2.1) https://rhn.redhat.com/ Red Hat (2.4.21) Red Hat Desktop (v. 3) / SRPMS kernel-2.4.21-37.EL.src.rpm Red Hat Desktop (v. 3) / IA-32 kernel-2.4.21-37.EL.athlon.rpm kernel-2.4.21-37.EL.i686.rpm kernel-BOOT-2.4.21-37.EL.i386.rpm kernel-doc-2.4.21-37.EL.i386.rpm kernel-hugemem-2.4.21-37.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-37.EL.i686.rpm kernel-smp-2.4.21-37.EL.athlon.rpm kernel-smp-2.4.21-37.EL.i686.rpm kernel-smp-unsupported-2.4.21-37.EL.athlon.rpm kernel-smp-unsupported-2.4.21-37.EL.i686.rpm kernel-source-2.4.21-37.EL.i386.rpm kernel-unsupported-2.4.21-37.EL.athlon.rpm kernel-unsupported-2.4.21-37.EL.i686.rpm Red Hat Desktop (v. 3) / x86_64 kernel-2.4.21-37.EL.ia32e.rpm kernel-2.4.21-37.EL.x86_64.rpm kernel-doc-2.4.21-37.EL.x86_64.rpm kernel-smp-2.4.21-37.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-37.EL.x86_64.rpm kernel-source-2.4.21-37.EL.x86_64.rpm kernel-unsupported-2.4.21-37.EL.ia32e.rpm kernel-unsupported-2.4.21-37.EL.x86_64.rpm Red Hat Enterprise Linux AS (v. 3) / SRPMS kernel-2.4.21-37.EL.src.rpm Red Hat Enterprise Linux AS (v. 3) / IA-32 kernel-2.4.21-37.EL.athlon.rpm kernel-2.4.21-37.EL.i686.rpm kernel-BOOT-2.4.21-37.EL.i386.rpm kernel-doc-2.4.21-37.EL.i386.rpm kernel-hugemem-2.4.21-37.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-37.EL.i686.rpm kernel-smp-2.4.21-37.EL.athlon.rpm kernel-smp-2.4.21-37.EL.i686.rpm kernel-smp-unsupported-2.4.21-37.EL.athlon.rpm kernel-smp-unsupported-2.4.21-37.EL.i686.rpm kernel-source-2.4.21-37.EL.i386.rpm kernel-unsupported-2.4.21-37.EL.athlon.rpm kernel-unsupported-2.4.21-37.EL.i686.rpm Red Hat Enterprise Linux AS (v. 3) / IA-64 kernel-2.4.21-37.EL.ia64.rpm kernel-doc-2.4.21-37.EL.ia64.rpm kernel-source-2.4.21-37.EL.ia64.rpm kernel-unsupported-2.4.21-37.EL.ia64.rpm Red Hat Enterprise Linux AS (v. 3) / PPC kernel-2.4.21-37.EL.ppc64iseries.rpm kernel-2.4.21-37.EL.ppc64pseries.rpm kernel-doc-2.4.21-37.EL.ppc64.rpm kernel-source-2.4.21-37.EL.ppc64.rpm kernel-unsupported-2.4.21-37.EL.ppc64iseries.rpm kernel-unsupported-2.4.21-37.EL.ppc64pseries.rpm Red Hat Enterprise Linux AS (v. 3) / s390 kernel-2.4.21-37.EL.s390.rpm kernel-doc-2.4.21-37.EL.s390.rpm kernel-source-2.4.21-37.EL.s390.rpm kernel-unsupported-2.4.21-37.EL.s390.rpm Red Hat Enterprise Linux AS (v. 3) / s390x kernel-2.4.21-37.EL.s390x.rpm kernel-doc-2.4.21-37.EL.s390x.rpm kernel-source-2.4.21-37.EL.s390x.rpm kernel-unsupported-2.4.21-37.EL.s390x.rpm Red Hat Enterprise Linux AS (v. 3) / x86_64 kernel-2.4.21-37.EL.ia32e.rpm kernel-2.4.21-37.EL.x86_64.rpm kernel-doc-2.4.21-37.EL.x86_64.rpm kernel-smp-2.4.21-37.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-37.EL.x86_64.rpm kernel-source-2.4.21-37.EL.x86_64.rpm kernel-unsupported-2.4.21-37.EL.ia32e.rpm kernel-unsupported-2.4.21-37.EL.x86_64.rpm Red Hat Enterprise Linux ES (v. 3) / SRPMS kernel-2.4.21-37.EL.src.rpm Red Hat Enterprise Linux ES (v. 3) / IA-32 kernel-2.4.21-37.EL.athlon.rpm kernel-2.4.21-37.EL.i686.rpm kernel-BOOT-2.4.21-37.EL.i386.rpm kernel-doc-2.4.21-37.EL.i386.rpm kernel-hugemem-2.4.21-37.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-37.EL.i686.rpm kernel-smp-2.4.21-37.EL.athlon.rpm kernel-smp-2.4.21-37.EL.i686.rpm kernel-smp-unsupported-2.4.21-37.EL.athlon.rpm kernel-smp-unsupported-2.4.21-37.EL.i686.rpm kernel-source-2.4.21-37.EL.i386.rpm kernel-unsupported-2.4.21-37.EL.athlon.rpm kernel-unsupported-2.4.21-37.EL.i686.rpm Red Hat Enterprise Linux ES (v. 3) / IA-64 kernel-2.4.21-37.EL.ia64.rpm kernel-doc-2.4.21-37.EL.ia64.rpm kernel-source-2.4.21-37.EL.ia64.rpm kernel-unsupported-2.4.21-37.EL.ia64.rpm Red Hat Enterprise Linux ES (v. 3) / x86_64 kernel-2.4.21-37.EL.ia32e.rpm kernel-2.4.21-37.EL.x86_64.rpm kernel-doc-2.4.21-37.EL.x86_64.rpm kernel-smp-2.4.21-37.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-37.EL.x86_64.rpm kernel-source-2.4.21-37.EL.x86_64.rpm kernel-unsupported-2.4.21-37.EL.ia32e.rpm kernel-unsupported-2.4.21-37.EL.x86_64.rpm Red Hat Enterprise Linux WS (v. 3) / SRPMS kernel-2.4.21-37.EL.src.rpm Red Hat Enterprise Linux WS (v. 3) / IA-32 kernel-2.4.21-37.EL.athlon.rpm kernel-2.4.21-37.EL.i686.rpm kernel-BOOT-2.4.21-37.EL.i386.rpm kernel-doc-2.4.21-37.EL.i386.rpm kernel-hugemem-2.4.21-37.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-37.EL.i686.rpm kernel-smp-2.4.21-37.EL.athlon.rpm kernel-smp-2.4.21-37.EL.i686.rpm kernel-smp-unsupported-2.4.21-37.EL.athlon.rpm kernel-smp-unsupported-2.4.21-37.EL.i686.rpm kernel-source-2.4.21-37.EL.i386.rpm kernel-unsupported-2.4.21-37.EL.athlon.rpm kernel-unsupported-2.4.21-37.EL.i686.rpm Red Hat Enterprise Linux WS (v. 3) / IA-64 kernel-2.4.21-37.EL.ia64.rpm kernel-doc-2.4.21-37.EL.ia64.rpm kernel-source-2.4.21-37.EL.ia64.rpm kernel-unsupported-2.4.21-37.EL.ia64.rpm Red Hat Enterprise Linux WS (v. 3) / x86_64 kernel-2.4.21-37.EL.ia32e.rpm kernel-2.4.21-37.EL.x86_64.rpm kernel-doc-2.4.21-37.EL.x86_64.rpm kernel-smp-2.4.21-37.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-37.EL.x86_64.rpm kernel-source-2.4.21-37.EL.x86_64.rpm kernel-unsupported-2.4.21-37.EL.ia32e.rpm kernel-unsupported-2.4.21-37.EL.x86_64.rpm SGI Advanced Linux Environment 3 / Patch 10290 ftp://patches.sgi.com/support/free/security/patches/ProPack/2.4/ Debian (kernel 2.4.16) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz ARM http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb Debian (kernel 2.4.18) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb Debian (kernel 2.4.19) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb Debian (kernel 2.4.17) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb HP Precision http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb Intel IA-64 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb IBM S/390 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb ARM http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb Motorola 680x0 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb |
|
Standar resources |
|
Property | Value |
CVE |
CAN-2004-1056 CAN-2005-0504 CAN-2005-0749 |
BID | |
Other resources |
|
Red Hat Security Advisory RHSA-2005:551-09 https://rhn.redhat.com/errata/RHSA-2005-551.html Red Hat Security Advisory RHSA-2005:529-12 https://rhn.redhat.com/errata/RHSA-2005-529.html Red Hat Security Advisory (RHSA-2005:081-11) https://rhn.redhat.com/errata/RHSA-2005-081.html SGI Security Advisory (20060402-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U.asc Debian Security Advisory (DSA 1067-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00152.html Debian Security Advisory (DSA 1069-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00156.html Debian Security Advisory (DSA 1070-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00155.html Debian Security Advisory (DSA 1082-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00168.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2005-08-31 |
1.1 | Aviso emitido por Red Hat (RHSA-2005:081-11) | 2005-10-07 |
1.2 | Aviso emitido por SGI (20060402-01-U) | 2006-04-11 |
1.3 | Aviso emitido por Debian (DSA 1067-1, DSA 1069-1, DSA 1070-1) | 2006-05-22 |
1.4 | Aviso emitido por Debian (DSA 1082-1) | 2006-05-31 |